meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, March 31st, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 31 March 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Spring4Shell/Java Confusion; XLSB Parsing; 3CX Phone Systems

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, March 31st, 2022 edition of the Sands Internet Storm Center's

0:08.1

Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.9

Well, today was certainly an interesting day if you're dealing with Java, and well, after a lot of confusion, the quick summaries,

0:23.0

we do have two significant vulnerabilities. For one of which a patch is available. That's

0:29.6

CVE 2022, 2020, 20263. And this is a vulnerability in Spring Cloud Function.

0:38.8

For the second one in Spring Core, there is no patch available at this point.

0:44.6

But for both vulnerabilities, there are exploits available.

0:49.2

And yes, they're already actively being exploited.

0:53.3

Let's start with the first one for which we do have a patch available.

0:56.8

That's CVE 2020-22-963, and it's in SpringCloud function.

1:05.1

An initial report was published for this vulnerability on Tuesday.

1:10.5

However, it was only rated medium,

1:13.1

and it wasn't clear, and exploits then have proven that,

1:17.3

that it's actually possible to gain unauthenticated

1:21.5

remote code execution with this vulnerability.

1:24.6

So the CVSS score of 5.4 is probably a little bit low.

1:30.3

Now, where it got more confusing then was that at the same time when we had this new vulnerability,

1:38.3

there was a blog post announcing another vulnerability in Spring Core, and that vulnerability did not have a CVE number,

1:49.0

and the Spring Project in the Git commit

1:53.8

that was sort of linked by this particular blog post

1:56.9

did not really acknowledge that this is actually a vulnerability,

2:03.3

but turns out it is an exploitable vulnerability that, again, leads to unauthenticated remote code execution.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.