meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, April 14th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 14 April 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. MSFT Patch Tuesday; Name:Wreck DNS Vulns; #PATCHEXCHANGEAGAIN

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, April 14th, 2021 edition of the Sandcent Storm Center's Stormcast.

0:09.6

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:15.1

While it's Microsoft's patch Tuesday again, we got patches for 114 vulnerabilities, 19 of which are rated critical.

0:24.9

Four have been previously disclosed and one is currently already being exploited.

0:31.9

Looking at the numbers, to compare them with prior numbers, you also have to take into account

0:35.6

that this now includes Google Chrome vulnerabilities

0:39.4

that have been patched by Google. After all, Edge is now really just a version of Google Chrome.

0:47.1

But probably the most interesting part of this month patch Tuesday is that we have yet another set of four critical exchange

0:58.3

vulnerabilities. The CVSS score of these vulnerabilities is 9.8 and exploitation is likely

1:06.4

according to Microsoft. Given what we just went through with Exchange, I hope everybody kept good notes and can

1:14.5

get those patches quickly rolled out.

1:17.8

No public exploit yet as far as I know.

1:21.7

These vulnerabilities have been reported responsibly to Microsoft, so they're not aware of them already being exploited in the wild.

1:31.7

But again, with all of the extension being spent on exchange lately, I'm pretty sure that we will

1:38.4

have an exploit available shortly. Now, if you are applying these exchange patches, keep in mind you first always

1:47.4

have to update to a supported version of exchange. So you have to first apply a cumulative update

1:55.7

to get to a supported version, then you apply the April patch in order to have a fully patched system.

2:03.9

If you do have one of the supported versions of Microsoft Exchange, and you hadn't yet gotten

2:10.7

around to applying the March patches, which, well, you're really late at this point, but you

2:16.6

only need to apply the April patch.

2:18.7

It does include all the March updates as well.

2:22.8

Then we do also have a surprising large number of vulnerabilities in RPC services that are

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.