meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, April 12th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 12 April 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microsoft Patch Tuesday; Windows LAPS Update; SAP and Adobe Patches

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, April 12, 2020,

0:05.1

23 edition of the Sands and its Storm Center's Stormcast.

0:09.0

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.9

Well, it's patch Tuesday, so lots of patches today.

0:18.1

Let's get started with Microsoft. We got patches for 114 different vulnerabilities.

0:25.9

Seven of them are critical and one is already being exploited. The already exploited

0:32.5

is CVE 2023-28252. This is a vulnerability in the Windows Common Log File System driver.

0:42.6

This driver runs as a system, so in this case, an arbitrary code execution, gives

0:48.8

your operator code execution as system.

0:51.6

That's where the privilege escalation comes from.

0:54.0

The Windows Common Log File

0:55.7

System driver has been the source of a number of similar vulnerabilities in the past.

1:03.2

CWSS score of this is only 7.8 because after all, it's just a privilege escalation vulnerability.

1:11.2

We do have a number of sort of similar privilege escalation vulnerabilities being patched

1:16.1

with this update, but this is the only one that's currently being exploited.

1:21.4

Now, let's take a look at the critical vulnerabilities.

1:24.4

One that I think is kind of interesting, is DHCP server remote code

1:30.3

execution vulnerability. Yes, that one is rated critical. Not a lot of details as to what this

1:37.6

exactly entails. It does, however, require authentication and does require an RPC call to the DHCP service.

1:46.1

So not something like a simple, unauthenticated DHCP message, which is why the CVS

1:53.2

score of this vulnerability is only 8.8, not sort of in the 9.8 range.

1:59.5

An attacker would have to be located on the same network as the DHCP service.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.