4.9 • 696 Ratings
🗓️ 18 November 2021
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, November 18th, 2021 edition of the Sansonet Storm Center's |
0:07.5 | Stormcast. My name is Johannes Ulrich, and the day I'm recording from Fort Walton Beach, Florida. |
0:15.0 | Researchers from TX1 Trend Micro Cyclone DNS and others have taken a look at the data distribution service |
0:25.0 | protocol or short DDS. And surprise, surprise they found vulnerabilities in the top six |
0:33.5 | implementations of this protocol. The total vulnerabilities being made public so far are 12 and some |
0:41.9 | of them may lead to arbitrary code execution. So first a little bit about DDS. Why is it |
0:48.7 | important? Well, it's important because it's often used for in and of things and industrial |
0:53.8 | control systems and number of |
0:56.5 | large vendors. |
0:57.8 | For example, Siemens are using this protocol. |
1:02.1 | The idea of the protocol is that you have a standardized way, how devices are able to send |
1:08.6 | information about themselves or information that they're collecting |
1:12.0 | to a network and then other devices are able to request that information. |
1:19.7 | There are number of options how this can happen, like for example, the data could be |
1:23.5 | formatted in XML or JSON. |
1:26.9 | The information exchange could happen over a network using |
1:30.2 | TCP. It could also happen via UDP or directly in memory. Out of these 12 vulnerabilities, |
1:39.2 | five are actually related to the XML implementation, including one vulnerability that's related to an unmaintained |
1:48.2 | XML library used by the particular vendor. |
1:52.9 | One of the vulnerabilities is also specifically to the standard, so essentially the standard |
1:59.8 | has to be updated in order to fix that vulnerability. |
2:04.1 | Since the affected systems here are usually industrial systems, so this is not a home system or |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.