4.9 • 696 Ratings
🗓️ 10 November 2021
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, November 10th, 2021 edition of the Sandstone Storm Center's Stormcast. |
0:08.3 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:14.3 | Well, it's patched Tuesday and we got patches from Microsoft for 55 different vulnerabilities. |
0:22.1 | Six of the vulnerabilities are rated critical. |
0:25.1 | Four were previously disclosed. |
0:27.4 | And then we have two vulnerabilities that have already been exploited according to Microsoft. |
0:33.4 | The first of the two already exploited vulnerabilities is CBE 20, 21, 4232,1, and this vulnerability affects well of all places Microsoft Exchange. |
0:48.6 | Now, this vulnerability isn't quite as bad as some of the prior vulnerabilities that we have seen in exchange, |
0:56.0 | a user needs to be authenticated in order to exploit it. But once authenticated, this |
1:03.3 | vulnerability allows for arbitrary code execution due to an improper validation of command-led arguments. |
1:11.6 | So this would be something where someone fished some credentials |
1:15.6 | and is now trying to get full access to your exchange server. |
1:21.6 | The fix, as usual, move to Outlook 365 and forget about running exchange on site. |
1:28.3 | At least that appears to be the standard fix that most organizations employ these days |
1:33.8 | once their exchange server is compromised. |
1:37.0 | The second already exploited vulnerability is CBE 2021-42292, and this is a security feature bypass in Microsoft Excel. |
1:48.8 | What this comes down to is that it's possible for an attacker to get you to execute code |
1:55.4 | in Excel without a warning. |
1:58.7 | Now, there have been a couple exploits like this disclosed recently. |
2:04.1 | Not sure if this is exactly what's being patched here, but given, of course, how many attacks |
2:11.1 | we see coming in with office macros, whether it's Excel or whether it's worth, this is |
2:17.4 | certainly something that you should pay attention to and patch quickly. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.