meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, April 1st, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 1 April 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Spring Clarifies Spring4Shell; Wyze Cam; Zyxel FW Patch; #Apple 0 Days #ipados #ios #0day

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, April 1st, 2020 edition of the Sands and its Storm Center's Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.0

Well, today we got some word from the Spring Project itself regarding the vulnerability that has commonly been referred to as Spring for Shell. It now has

0:22.9

a CBE 2022-22-965 and they provided some guidance on when you may or may not be vulnerable

0:33.8

to this particular problem. First of all, you need to be running JDK9 or later.

0:40.5

That already has been known yesterday.

0:43.4

Also, you need to be using the Spring MVC or the Spring Webflux components in order to be vulnerable.

0:51.6

More details within our diary and also, of course, from the advisory that was

0:57.6

published by Spring. Now, we are seeing a number of exploit attempts for this vulnerability.

1:05.1

Nothing really too crazy at this point. Actually, quite a few less than what we saw with Log 4J, less researchers at

1:13.6

this point sort of probing it. And really, the probes we see so far are really just sort of

1:18.5

checking it out, seeing if you may be vulnerable, also looking for already pre-installed web shells,

1:26.6

because one way this vulnerability would be

1:29.2

exploited is by someone essentially reconfiguring, logging in the application in order to

1:35.5

create a web shell on the vulnerable system. So in short, no log for Jay as far as the scale

1:42.7

of this vulnerability goes.

1:44.6

Only very specific applications are vulnerable, but if you're running one of those applications

1:50.4

that uses these particular libraries in the particular configuration, then you certainly

1:56.9

should update and patches are available now. But hey, if you don't have any Java applications to patch,

2:04.3

maybe take a look at your Apple devices.

2:06.9

Apple today released updates for MacOS,

2:10.3

Catalina, iOS, and iPadOS.

2:13.2

And two vulnerabilities are being addressed here.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.