meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, March 20th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 20 March 2023

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Obfuscated Backdoor; Samsung Exynos Vuln; Android Image Cropping Problem; Bitwarden PIN

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, March 20th, 2003 edition of the Sands and the Storm Center's Stormcast.

0:09.0

My name is Johannes Ulrich and today I'm recording from Augusta, Georgia.

0:14.6

Let's start with a diary from Friday from Xavier.

0:18.7

Xavi looked at a back door that Juniper identified as targeting VMware ESXI servers.

0:26.9

This particular backdoor was injected using an vulnerability in the OpenSLP service,

0:33.7

very common vulnerability to be exploited in VMware ESXI.

0:39.0

What Xavier looked into is, it's actually a new backdoor or, well, just something old

0:45.1

that sort of got rehashed.

0:47.6

That's exactly sort of what happened here.

0:50.3

It just used more obfuscation with that making it past current detection rule set up for this kind of backdoor.

0:59.3

But in its essence, it was still the good old backdoor that has been around for a couple years now.

1:08.6

Well, on Friday wasn't a good day for Android device.

1:12.6

We have sort of two Android-related stories.

1:15.7

The first story here, not just Android-related, but very much sort of Android-focused.

1:22.8

And that's a vulnerability in the Samsung Exenus chip. This chip is the baseband chip for many phones,

1:32.7

not just phones made by Samsung, but apparently also used, for example, by Vivo, also by some of

1:40.2

the Google Pixel devices. And interestingly, this chip is also used in some of the modems that you do find in

1:49.1

cars, in particular the Exenus Auto T-5123 chip set.

1:55.1

Google's project, CERA identified 18 vulnerabilities in this chipset.

2:00.2

Four of these vulnerabilities do allow arbitrary remote code execution via the phone network.

2:08.9

So the only thing an attacker would need is the victim's phone number.

2:14.1

The other vulnerabilities, I wouldn't really discount them either.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.