meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, June 15th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 15 June 2022

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microsoft Patch Tuesday; Adobe Patches; Synlaps Azure Vuln; Hetzbleed

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, June 15th, 2020 edition of the Sansomid Storm Center's Stormcast. My name is Johannes Ulrich. And today I'm recording from Jacksonville, Florida.

0:14.7

Well, it's patched Tuesday and, of course, the patch we were all waiting for, which the patch for c v.E 2020-3190 or the

0:26.1

fallina vulnerability did get released even though things were a little bit complicated here in the

0:32.1

sense that the release date for this patch was actually labeled as May 30th, so it didn't really show up in the normal June patch Tuesday feed.

0:43.8

But if you're applying the Rola patch, this Folina patch is included and you should be good to go.

0:52.1

Now, the patch fixes the command injection vulnerability in the diagnostic tool.

0:58.2

It does not prevent the diagnostic tool from being started.

1:02.9

So this was when this vulnerability was first discovered, a little bit the question, what's the actual vulnerability here?

1:10.2

And, well, the workaround actually

1:12.6

prevented the diagnostic tool from being started but the patch now does allow the diagnostic

1:19.9

tool to be started in a secure way so it's no longer exploitable if you want to be careful then

1:27.1

you may very well leave the

1:29.0

workaround in place, so the diagnostic tool does not start. Haven't really heard of any

1:34.9

side effects of that workaround. May as well keep it safe and don't allow the tool to be

1:44.0

started. In addition, of course, to applying the patch,

1:47.4

you definitely should apply this patch. Now, aside from the patch for this Falina vulnerability,

1:54.8

we do have yet another critical vulnerability being patched in Windows NFS.

2:01.8

This vulnerability, I think, should the third month in a row that we have critical

2:06.8

vulnerabilities being patched here, all of them, remote code execution vulnerabilities,

2:12.1

haven't seen any exploits for any of these vulnerabilities so far. So may not be the biggest problem here.

2:19.4

Also only affects the most recent version of NFS,

2:23.8

NFS version 4.1, which you may disable.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.