meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, June 1st, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 1 June 2022

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Follina Update; OAS Platform Vuln; Exposed MySQL;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, June 1st, 2020 edition of the Sandsenet Storm Center's Stormcast.

0:08.6

My name is Johannes Ulrich.

0:10.3

And today I'm recording from Jacksonville, Florida.

0:14.6

Well, let's start with an update on the MSMSDT vulnerability that I pretty much dedicated the podcast to yesterday after recording

0:25.8

the podcast. Microsoft did release a knowledge-based article and an official vulnerability page

0:34.2

for this issue. We now also have CVE number 22, 32, 3190, and the name

0:43.8

Fulina has sort of caught on for this vulnerability. Microsoft at this point really doesn't

0:50.2

recommend anything different than what has been recommended before, and this is to disable

0:55.8

the MSDT URL protocol, and with that the diagnostic tool will no longer automatically

1:03.9

launch.

1:05.3

Also, various exploits have been released so far.

1:09.4

A lot of what we have seen is really just pen testers and people

1:12.9

experimenting with the vulnerability, but there are also some actual exploitation of this

1:20.5

vulnerability that are more prevalent now out in the wild. Before the vulnerability was released, there were only only two instances known of this

1:30.9

vulnerability being used, but now everything from Chinese APT to script kitties are using

1:39.6

this vulnerability.

1:41.4

In some cases like the one case that we have seen earlier today, the attacker

1:46.9

didn't even change out of some of the comments and such being left behind in the proof of

1:53.3

concept, exploit tools that were released. So very low effort attacks that are now taking

2:00.2

advantage of this vulnerability.

2:03.2

Nothing for Microsoft yet about a potential patch for this vulnerability.

2:07.9

The next patch Tuesday would be in two weeks on June 14th if my patch Tuesday math is correct.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.