meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, May 15th 2020

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 15 May 2020

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. rethinking severity; top exploited vulns; iOS Vulnerability Glut; BigIP

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, May 15th, 2020 edition of the Sand Center and Storm Center's Stormcast.

0:07.8

My name is Johannes Ulrich.

0:09.6

And I'm recording from Jacksonville, Florida.

0:14.4

Now, when we are talking about Windows patches and as we did this Tuesday, we always focus on what Microsoft calls its critical

0:24.9

vulnerabilities. Rob today in his diary actually picked up on one of the medium vulnerabilities

0:32.3

to kind of show that you probably shouldn't neglect them. The vulnerability here was CVE 2020 1048.

0:40.7

Now this vulnerability has a rating of a medium

0:44.5

and it's a privilege escalation in the printer spooler.

0:48.4

However, it turns out to be actually a fairly simple,

0:52.1

persistent back door. All you have to do is add a new printer

0:57.0

port that points to the famous UAL API.DL and essentially anything that you sent, any binary

1:06.2

that you sent to this printer port will be executed. Now admittedly CVSS score of this vulnerability is 7.8, which isn't exactly low, but you definitely

1:17.6

shouldn't really miss out on some of these lower vulnerabilities.

1:22.6

Luckily these days, most people just apply the full set of patches so there isn't really any cherry

1:29.3

picking that usually happens that may overlook an issue like this. And the US 3rd

1:38.0

published the list of what they're calling the top 10 most exploited vulnerabilities

1:42.3

from 2016 to 2019. And while it yet again shows how important

1:49.1

it is to patch Windows and Office, many of the vulnerabilities are office and

1:55.8

they're not the recent ones. They're going back like to 2017, even 2012.

2:03.5

So these vulnerabilities are still causing a lot of pain for organizations.

2:08.6

Now aside from office, we also have SharePoint vulnerabilities here, Adobe Flash,

2:13.4

of course, and then the famous Apache Struts vulnerability that of course caused quite a bit of pain

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.