meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, November 19th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 19 November 2024

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Unpatched Citrix Vuln Exploited; Microsoft Power Pages Issues; Manageengine ADAudit Plus SQL Injection

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, November 19th, 2024 edition of the Sands and at Storm Center's

0:08.1

Stormcast. My name is Johannes Ulrich and the time I'm recording from Singapore.

0:14.2

Late last week, Watchtower Labs did release details regarding two so far unpatched vulnerabilities in Citrix's virtual apps

0:25.6

and desktops.

0:27.6

The reason for this particular product to exist is that it essentially allows a solution

0:33.1

to remotely access desktop applications, and often this is used for remote workers in order

0:40.5

to allow them access to these applications without actually exposing any data on

0:46.0

these remote desktops to the remote workers machine to better protect the

0:51.7

confidentiality of the data on this virtual desktop.

0:57.0

One feature provided by the solution is the ability also to record any desktop sessions.

1:03.0

That is, for example, useful for support, where support wants to see what exactly happened on a particular user system, but also just to monitor what remote workers are.

1:15.2

The vulnerability that Watchtower found is related to the ability to then review these remote sessions.

1:24.6

One of the functions being used here is susceptible to deseraturalization

1:30.1

vulnerability. Well, that vulnerability apparently can be exploited without even authenticating

1:37.5

to the system. What we see now is that this particular vulnerability is actively being exploited.

1:45.0

We saw a good number of exploit attempts hit a particular honeypot of hours.

1:52.0

The code they're trying to execute is very typical.

1:55.0

It's basically trying to download additional malware apparently from a remote site.

2:00.0

I wasn't able to retrieve the actual

2:03.3

malware that was being offered here. I'm just getting a 404. It's possible that the attacker

2:09.3

actually doesn't have a file there, but it's just looking for any IP addresses that are reaching

2:14.8

out to this particular URL. Citrix also just released a patch for this vulnerability.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.