meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, October 28th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 28 October 2024

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Old Ivanti Vulns Exploited; Arcadyan Wifi RCE; Okta iOS Vuln; TeamTNT Docker Hunt

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, October 28, 2004 edition of the Sands and its Storms

0:07.2

Center's Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:14.4

In diaries today, just a quick reminder that older Evanti-Wanabiliies are still being exploited quite aggressively, had two today

0:24.6

that sort of raised some alarms, and both of them were which he discussed back in January

0:32.1

and also exploited back then.

0:34.5

And it's of a combination of, first of all, an authentication bypass vulnerability.

0:39.9

And that's a pretty straightforward directory traversal issue. And then secondly, of course,

0:45.8

how it's being exploited, where the one scan that we are seeing here is not really the exploit itself then,

0:53.4

but check if a specific backdoor, a web shell

0:58.2

is being installed that has been seen in some of these earlier exploit attempts back in January.

1:06.8

The web shell here is a little bit tricky to detect in the sense that it's not sort of additional files being added to the system, but files that exist on the system being modified.

1:20.2

And SSD Secure Disclosure published blog post with details regarding vulnerability affecting at least one Wi-Fi access point vendor.

1:32.9

This particular access point is made by Arcadian.

1:36.1

However, the vulnerability is sort of interesting in that it's not in software.

1:41.8

It's actually sort of required by this particular vendor by this access point,

1:46.7

but the vulnerable software here is produced by the Wi-Fi Alliance.

1:52.7

Wi-Fi Alliance is an industry organization that verifies if appliances like this comply with

2:00.0

the respective Wi-Fi standards, and in order to facilitate

2:03.9

this, they actually developed a test suite. The problem here is that Arcadian apparently

2:10.5

still left this test suite enabled on its production routers that were sold to the public,

2:18.2

but it's very possible that other vendors did the same thing.

2:23.0

If this test suite is enabled,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.