4.9 • 696 Ratings
🗓️ 6 August 2021
⏱️ 15 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Friday, August 6, 2021 edition of the Sandtonet Stormsenders Stormcast. |
0:07.7 | My name is Johannes Ulrich and the time recording from Stockholm, Germany. |
0:13.2 | Cisco released a number of updates today. |
0:16.3 | At the top of these updates are a critical vulnerability in the Cisco RV 340 and 345 small business |
0:26.5 | routers. |
0:27.8 | These routers have had a very rich vulnerability history and yet again do we have arbitrary code |
0:36.6 | execution or denial of service without authentication on |
0:41.6 | these devices by sending crafted HTTP requests? No exact details, how this exactly happens, |
0:49.8 | what the exact nature of the vulnerability is other than an urgent request to patch the |
0:57.6 | vulnerable firmware and of course not to expose your admin interfaces on devices like this. |
1:05.2 | Like I mentioned, there was a rich history of similar vulnerabilities in the past. |
1:09.7 | I would also be a little bit careful with the |
1:12.0 | similar devices that may be end of life that are not explicitly listed in this advisory. |
1:21.6 | And TrustWaves Spider Lab came across an interesting vulnerability in Telegram on Mac OS affecting self-destructing messages. |
1:30.4 | This is a difficult feature to implement correctly. |
1:34.0 | The idea is that as soon as a user opens a message, it will self-destruct, meaning all |
1:39.9 | evidence of the message will be deleted from the recipient's system. |
1:45.0 | The problem is that even before a user actually opens the message within Telegram, |
1:51.0 | a copy of the message in particular media files are written to a cache file. |
1:57.0 | A user is now able to open the cache file without triggering the self-destruct logic, |
2:05.2 | and that way the image remains on the recipient's system. I don't think there's really sort of |
2:11.6 | a bulletproof way to implement these self-destruct messages. A user should always be able |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.