meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, September 12th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 12 September 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. More Apple Patches; Wiki Eve Attack; Google Looker Studio Phish; HPE One View Vuln;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, September 12, 2020,

0:04.2

edition of the Sandler, Storm Center's Stormcast.

0:08.6

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.0

Today we got more patches from Apple, again patching one of the two Saturday-warned- two Saturday vulnerabilities that have already been exploited.

0:25.3

Only one of them, but this time for the older operating systems.

0:30.6

This is just a patch for the Image IO vulnerability, CVE 2023 41064.

0:43.3

Not sure if there is still yet another patch coming then for the wallet vulnerability or if that one does necessarily apply to these older operating systems.

0:50.3

But remember the image I all, that's the vulnerability that actually did allow the code

0:56.6

execution. The wallet vulnerability just sort of assisted in the exploitation of this vulnerability.

1:04.8

And we got an interesting attack against Wi-Fi networks. This particular attack was dubbed Y-K-I-EVE, and its

1:16.8

vulnerability allows the limited decryption of some numeric input. Now, the way this works is that

1:25.9

modern Wi-Fi networks use something called beamforming,

1:30.7

where an access point is essentially trying to direct Wi-Fi beam at a particular device.

1:37.4

In order for this to work, the device itself is then reporting back information about basically the signal quality it receives,

1:46.9

and that's the beam forming feedback information.

1:51.1

The beam forming feedback information is not encrypted, and what essentially allows for is

1:57.1

that an attacker can measure by intercepting that signal what the signal strength is between

2:03.2

the access point and the mobile device, in particular for a mobile device where a user is

2:09.5

using an on-screen keyboard.

2:11.8

The hand movement is intercepting and interfering with the beam, So the hand position on the keyboard can essentially

2:20.3

be derived by looking at these signals. This is an attack that is far from perfect. I think

2:29.0

they said something like about 50% success in sort of getting like pins and the like.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.