meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, May 17th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 17 May 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Apple Updates; Evil Never Sleeps; JS Tracker Keystroke Logging

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, May 17, 2022 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.1

Apple today released updates for pretty much everything in its portfolio, it's macOS operating systems,

0:23.2

Catalina, Bixer, and Monoray, TVOS, iPadOS, iOS, iOS,

0:28.2

watchOS, so every Apple product should be updated.

0:32.4

We've got a total of 86 different vulnerabilities.

0:36.9

Now, among interesting vulnerabilities is, first of all, CVE

0:40.8

2020-22675. This vulnerability is an out-of-bounds right issue and it allows an application

0:50.8

to execute arbitrary code with kernel privileges.

0:57.4

So what this comes down to essentially approach escalation vulnerability.

1:03.4

If someone is able to run code in your system, they're able to do so with kernel privileges.

1:10.8

This vulnerability was actually patched in Catalina in April, and now we get the patch for Bixer as well.

1:12.8

There was a little bit confusion back then why Apple didn't immediately come up with a patch

1:19.1

for the older operating systems.

1:20.7

I guess we got that patch now.

1:24.1

Lots of approach escalation vulnerabilities, lots of issues in open source software like Apache, SIP, CLEP, OpenSSL, and others are being addressed here.

1:35.1

A couple other sort of interesting vulnerabilities. One fixes a problem with software update, and this vulnerability could be used to access restricted files.

1:48.7

Also quite a few Wi-Fi vulnerabilities.

1:51.2

For the most part, I would create them as privilege escalation vulnerabilities, some denial

1:56.5

of service vulnerabilities.

1:59.5

For example, one of the vulnerabilities would allow an application

2:03.8

to execute operator code with system privileges. I rated this as approach escalation

2:10.6

vulnerability. It doesn't look like an attacker would, for example, be able to send data

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.