[主旨說明:]【漏洞預警】微軟Windows TCP/IP堆疊存在安全漏洞(CVE-2020-16898),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新!


[內容說明:]

轉發 行政院國家資通安全會報技術服務中心 資安訊息警訊 NISAC-ANA-202010-0502


研究人員發現微軟Windows TCP/IP堆疊(TCP/IP stack)未能正確處理ICMPv6之路由器公告(Router Advertisement)封包,導致存在安全漏洞(CVE-2020-16898),遠端攻擊者可藉由發送特製的ICMPv6路由器公告封包,利用此漏洞進而執行任意程式碼。


情資分享等級: WHITE(情資內容為可公開揭露之資訊)


此訊息僅發送到「區縣市網路中心」,煩請貴單位協助公告或轉發


[影響平台:]

受影響Windows版本如下:

Windows 10 Version 1709 for 32-bit Systems;

Windows 10 Version 1709 for ARM64-based Systems;

Windows 10 Version 1709 for x64-based Systems;

Windows 10 Version 1803 for 32-bit Systems;

Windows 10 Version 1803 for ARM64-based Systems;

Windows 10 Version 1803 for x64-based Systems;

Windows 10 Version 1809 for 32-bit Systems;

Windows 10 Version 1809 for ARM64-based Systems;

Windows 10 Version 1809 for x64-based Systems;

Windows 10 Version 1903 for 32-bit Systems;

Windows 10 Version 1903 for ARM64-based Systems;

Windows 10 Version 1903 for x64-based Systems;

Windows 10 Version 1909 for 32-bit Systems;

Windows 10 Version 1909 for ARM64-based Systems;

Windows 10 Version 1909 for x64-based Systems;

Windows 10 Version 2004 for 32-bit Systems;

Windows 10 Version 2004 for ARM64-based Systems;

Windows 10 Version 2004 for x64-based Systems;

Windows Server 2019;

Windows Server 2019 (Server Core installation);

Windows Server, version 1903 (Server Core installation);

Windows Server, version 1909 (Server Core installation);

Windows Server, version 2004 (Server Core installation);


[建議措施:]

1.目前微軟官方已針對此漏洞釋出更新程式,請各機關聯絡設備維護廠商或參考以下建議進行更新:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898


2.如無法更新,亦可於Windows 1709以上版本環境中,執行「netsh int ipv6 set int *INTERFACENUMBER* rabaseddnsconfig=disable」之PowerShell指令,藉由停用ICMPv6 RDNSS功能,防止攻擊者進行弱點利用。


[參考資料:]

1. https://portalmsrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898

2. https://vuldb.com/?id.162598