meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, February 15th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 15 February 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microsoft Patch Tuesday; Adobe Patches; Intel OpenBMC Patches

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, February 15th, 2020,

0:04.7

edition of the Sansonet Storms, and Stormcast, my name is Johannes Ulrich,

0:10.9

and today I'm recording from Jacksonville, Florida.

0:14.9

It's Microsoft Patch Tuesday, and well, we got a sort of interesting patch Tuesday.

0:39.8

Today, 80 patches is what I counted, or 80 vulnerabilities being patched. Now, this includes the chromium vulnerabilities that affect Microsoft Edge. You may see some different numbers, always being quoted here for the number of vulnerabilities and that's sort of one of the variables.

0:52.9

Nine of the vulnerabilities were rated as critical by Microsoft, and three vulnerabilities are already being exploited, but they're all rated important.

0:58.5

First, we do have CVE 2020, 23, 21715.

1:02.4

That is a Microsoft publisher bug,

1:06.9

and the basic problem here is that macros may be executed,

1:09.8

even though they're not supposed to be executed based on the stricter policies that Microsoft has recently established.

1:15.6

The second already exploited vulnerability is CVE 202023-23376.

1:22.6

That's a Windows Common Log, file, assistant driver, Elevation of Privilege Vulnerability.

1:29.1

And then we have the third one, that's CVE 202023, 21-823.

1:35.0

Now, this is one of those Windows graphics component remote code execution vulnerabilities.

1:40.8

The problem with this one is that this is sort of affecting also software written for Windows,

1:47.3

and the patch actually comes via the Microsoft Store, so make sure you have those updates enabled,

1:55.4

so they're not part of your standard patch set that you may download from Microsoft directly.

2:02.7

There are two vulnerabilities that I think are kind of also interesting.

2:06.8

They both have a high CBSS score in the sort of high 9s.

2:11.9

CVE 2023, 21803.

2:14.8

This is a Windows Ice Gassi Discovery Service remote code execution vulnerability.

2:19.9

Now, Ice Gussi is something that you typically only use sort of inside your network.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.