4.9 • 696 Ratings
🗓️ 13 January 2022
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, January 13th, 2020 edition of the Sansanet Storm Center's |
0:07.1 | Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:13.5 | CVE 2022-219070, the HTTP CISW vulnerability patched by Microsoft in Tuesday's patch update is still, well, the big news |
0:24.7 | item here, but really not much new about it. No real talk about any exploits coming out or any |
0:31.5 | proof of concepts or anything like that. Also, no real details about the nature of the vulnerability at this point. |
0:39.3 | You can take this as a good sign that it will take a while for an exploit to be actually released, |
0:44.3 | but I wouldn't let off on patching. Definitely keep patching, try to get this patch rolled out, |
0:52.3 | in particular the public facing system as much as possible |
0:56.0 | by the end of this week. Looking at prior vulnerabilities in HGP.Sys, they have turned out to be |
1:03.8 | difficult to exploit in part because of some of the memory protections and such being built |
1:10.3 | into HGPSys and kernel mode drivers like this. |
1:14.4 | So we may never really see sort of a great remote code execution exploit for this, |
1:20.7 | but all it takes is one and yes, it's certainly possible. |
1:26.0 | May just take, for example, some additional vulnerabilities that leak some of the |
1:31.3 | kernel space information or such that may be needed in order to exploit this vulnerability. |
1:37.7 | At least things like this have been done in prior similar vulnerabilities. |
1:43.2 | Just to summarize what we know or assume, so far I've published an FAQ about this vulnerability, |
1:49.8 | and the link will, of course, be in the show notes. |
1:53.8 | Sometimes we're just lucky in researchers give us some time before they publish all the details |
1:58.8 | as one example, some Sonic Wall vulnerabilities with a CVSS score of 9.8 that were patched at the beginning of December are now well exploitable in a sense that there is a blog post that was now published by Rapid 7 with additional details regarding |
2:20.7 | these vulnerabilities. |
2:22.7 | This affected the SMA models 200, 210, 400, 400, 4010 and 500, and this is also an unauthenticated |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.