meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, September 8th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 8 September 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Fortinet Unpatched Priv Esc Flaws; NSM Vulnerabilities

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, September 8, 2016 edition of the Sansanet Storms anders Stormcast.

0:07.6

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:12.6

In case you're using our blog list, I updated it earlier today.

0:17.7

Really, the only thing that changed is how I'm actually picking these top 20

0:23.6

slash 24 networks. Other than that, the format and such state the same. So you shouldn't really

0:29.6

see much of a difference here if you just imported. If you do see any problems, please let me

0:35.6

know. Also, if you do see any false positives, please let me know.

0:39.9

And actually, the main reason for this rebuild was to change the architecture, someone

0:44.1

to make it easier to automatically eliminate some common false positives.

0:50.0

Search.org published an advisory regarding 40-net 41 load balancers. Apparently they suffer

0:57.4

from five different vulnerabilities. Only one of these vulnerabilities has been addressed so far.

1:03.9

And according to the advisory, Fortinet has been somewhat non-responsive to these vulnerabilities.

1:12.6

Now, the one vulnerability was addressed in a recent update does allow an authenticated

1:19.6

but non-administrative user to actually obtain PCAP-traffic passing through the device.

1:28.3

The other vulnerabilities do allow, for example, privilege escalation,

1:32.3

where an authenticated again, but a non-privileged user

1:37.3

can execute arbitrary commands, and then there is also a cross-site scripting vulnerability

1:43.3

that of course could also be used for privilege

1:46.0

escalation.

1:47.0

CERT.org did assign a base CVSS metrics of 9.3 to these vulnerabilities.

1:56.0

There isn't really a great workaround for any of them at this point, but what you probably should do is

2:02.1

just limit access to the device and not hand out credentials unless you further audit access

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.