meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, February 8th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 8 February 2023

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Bluetooth Vuln Trends; OpenSSL Update; GoAnywhere Patch and PoC; Quakbot via OneNote

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, February 8, 2023 edition of the Sandcent Storm Center's Stormcast. My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:14.4

It's probably hard to find a device these days mobile or not mobile that doesn't have some kind of Bluetooth functionality.

0:22.4

Mobile phones, cars, PCs, pretty much any computing device and non-computing device

0:28.5

has Bluetooth in some variation evolved. Also, the standard itself is still evolving.

0:38.1

Yi Ching, who is our handler in Singapore and also part of a research group that looks into

0:43.7

Bluetooth flaws, has now looked at some of the historic trends as far as vulnerabilities go

0:51.0

in Bluetooth devices.

0:53.2

And well, the trend doesn't look good for the last four years

0:57.3

we pretty much had around a hundred new vulnerabilities each year as far as Bluetooth is concerned

1:04.0

and this is significantly up from prior years luckily it seems to have leveled out like

1:10.6

these last four years so it doesn't seem to

1:12.6

be really going up anymore, but still, Bluetooth is one of those protocols that probably

1:18.6

will keep on giving as far as vulnerabilities are concerned.

1:23.6

The classic dangerous pattern here is that we have a fairly complex protocol and a very

1:29.3

power limited implementation. Bluetooth implementations are typically created based on that they are using

1:38.3

as little power as possible, which of course means that you don't really have a lot of overhead

1:43.5

to do additional

1:44.8

input validation and the like. And we got an update for OpenSSL. Now, this affects OpenSL

1:53.0

3-0-111 as well as 102, and it fixes two vulnerabilities. One is side channel vulnerability.

2:03.2

This is timing based,

2:04.5

so by essentially observing how long it takes to decrypt something,

2:11.1

an attacker may be able to recover plain text.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.