meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, May 10th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 May 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microsoft Patch Tuesday; GitHub Push Protection

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, May 10th, 2003 edition of the Sandinert Storm Center's Stormcast.

0:08.9

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:14.6

Well, it was Patch Tuesday.

0:16.5

I think I actually got it wrong earlier this week, where I mentioned patch Tuesday would be

0:21.3

next week, but luckily, Renato has his act together and published his usual concise overview

0:29.8

of all the patches released by Microsoft.

0:33.9

49 vulnerabilities patched, six critical and two are already being exploited.

0:40.8

One of the exploited vulnerabilities that I thought was kind of interesting was a secure boot security feature bypass vulnerability.

0:50.2

We had vulnerabilities like this before, not I'm not sure which exact variety here has already been exploited or whether it was already published CVE 2023, 24-932.

1:05.0

Of course, in order to exploit this vulnerability, you need to have physical access to the system, but that's exactly

1:12.9

what secure boot is supposed to protect. The second already exploited vulnerability is one of those

1:20.7

wind 32K elevation of bridge vulnerabilities. Plenty of them in the past, so no real big surprise here.

1:29.3

CVE 2020, 23, 29, 336.

1:33.5

CVS has score of 7.8, which is kind of what you usually get for a privilege escalation vulnerability.

1:41.7

Among the critical vulnerabilities, the most interesting one is probably the

1:46.5

Windows Network File System vulnerability. Again, a system that we have had a number of

1:52.7

critical vulnerabilities against in the past. Some exploits were released against those past

1:58.8

vulnerabilities. CVSS score of 9.8 unauthenticated remote code

2:05.7

execution over the network. As a workaround, Microsoft recommends disabling NFS version 4.

2:14.9

Version 2 and 3 are not affected by this vulnerability. However, Microsoft

2:20.5

points out there was an earlier vulnerability just a year ago in May 22, so that one you

2:26.5

still need to patch even if you do apply the workaround. You also need to restart the

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.