4.9 • 696 Ratings
🗓️ 1 August 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, August 1st, 2003 edition of the Sansonet Storm Center's Stormcast. |
0:07.3 | My name is Johannes Ulrich. |
0:09.4 | And today I'm recording from Jacksonville, Florida. |
0:13.5 | And we got a second already exploited, so zero-day vulnerability from Avanti targeting its endpoint manager mobile core. |
0:23.4 | Remember, Avanti just patched the unauthenticated API Access vulnerability CVE 202033-35-078. |
0:34.0 | This new vulnerability, CVE 202033-3535081, was apparently used in conjunction with this authentication bypass vulnerability. |
0:45.9 | After the attacker did have access to the system as an administrator, this second vulnerability was then used to execute arbitrary shell commands and also |
0:56.6 | write arbitrary files to the system. Great way of course to get additional persistence on the system |
1:03.9 | and something that you need to be aware of if you are performing instant response on a compromised amount the endpoint manager mobile. |
1:13.3 | Patches are available, but the real impact here is for instant response. |
1:18.8 | And then you have new malware that appears to be targeting Redis data stores. Redis, sometimes |
1:24.9 | also called a NoSQL database, has an interesting replication feature. |
1:30.6 | And the way this is exploited here is that the attacker essentially sets up a Redis Datastore |
1:36.9 | and then uses the slave off command on the vulnerable server in order to make it replicate the content from the malicious |
1:48.3 | server. This, of course, already kind of requires a bad configuration here, where you are |
1:54.2 | exposing your Redis store and allow commands like this to be run in your Redis instance. |
2:00.5 | But once, of course, you're compromised like this to be run in your Redis instance, but once, of course, you're compromised |
2:03.6 | like this, then the attacker can do whatever they want, as in this case upload additional modules |
2:09.9 | to, for example, include a crypto coin miner or features like reverse shells. |
2:16.5 | Also interesting here, the particular malware is not just written in Rust, |
2:21.6 | but also comes as an elf and a PE binary, |
2:25.5 | so it should run on Linux as well as on Windows, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.