4.9 • 696 Ratings
🗓️ 15 December 2021
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, December 15th, 2021 edition of the Sansonet Stormsend, Stormcast. My name is Johannes Ulrich. |
0:10.0 | And I'm recording from Jacksonville, Florida. |
0:14.0 | Well, it's Microsoft Patch Tuesday and we got patches for 83 Warner Billies, seven of which are critical, and then we also have |
0:23.7 | six previously disclosed and one already exploited vulnerability. |
0:29.2 | The one that's already exploited is the Windows AppX installer vulnerability, CVE 2021, |
0:36.3 | 4389,0, and this has been used by fairly common |
0:41.3 | Malver like Emot Head, TrickBot and the like. The problem with this installer was really |
0:47.2 | more sort of a human user interface problem in that Malver could essentially masquerade as |
0:54.1 | trusted software as the installer popped up and |
0:58.0 | warned the user about software about to be installed. |
1:02.0 | Interesting is also a critical vulnerability in the Internet Storage Name Service or ISNS |
1:08.0 | protocol. Now, this is not installed by default. It's part of ISCSI and has a CVSS score of |
1:18.1 | 9.8. However, Microsoft rates the exploitability of this vulnerability as more likely. There are also critical vulnerabilities in Microsoft Office that can lead to remote code execution |
1:33.9 | and also a 9.8 CVSS score for a remote code execution in Visual Studio Code, the Windows |
1:43.7 | subsystem for Linux extension. |
1:47.1 | The one vulnerability that's certainly worth your attention and patch quickly is the Windows |
1:53.7 | app installer vulnerability, given that it's already fairly widely being exploited. |
1:58.9 | Among the remaining vulnerabilities, I don't really see anything that really warrants expediting |
2:05.2 | the patch other than maybe the ISNS vulnerability if you're actually running this component. |
2:12.7 | And then we are not quite done yet with Log 4J, and there is an other update for Log 4J, so we are now |
2:20.1 | at version 2.16. The tricky part here is that 2.15 fixed the JNDI problem that we |
2:29.8 | originally had and that caused a lot of the problems with Log 4J, but there are certain |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.