meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, November 13th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 13 November 2024

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microsoft Patch Tuesday; CISA Top Exploited Vulns; APT Embeds Malware Using Flutter

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, November 13th, 2024 edition of the Sansonet Storms on a Stormcast.

0:08.2

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:13.6

Well, it's Microsoft Patch Tuesday. We got patches for 83 vulnerabilities.

0:18.7

Three of them are classified as critical to have been exploited already and

0:24.2

two have also been disclosed prior to this Tuesday. So let's highlight some of the

0:31.6

vulnerabilities that Renato, who wrote up our diary day, found notable. First of all, yet

0:37.2

another NTLM hash disclosure, spoofing

0:39.8

vulnerability. This one is exploited via Outlook. It's yet another one of these MSHtml

0:46.8

vulnerability. So that's an explorer component that still hangs around in modern versions

0:52.2

of Windows. What's also interesting here is the victim

0:56.2

does not have to actually open the attachment. It's sufficient to select it, so just single-click

1:02.8

it or to inspect it by right-clicking it. That'll already trigger the vulnerability here.

1:10.2

You also got a purge escalation vulnerability in Windows Task Schedular.

1:14.4

Haven't seen them in a while, but the Task Scheduleer, of course, runs code from various users.

1:21.1

And there's always a little risk here of some loss of control over what user the code is actually running at.

1:29.4

We also got yet another one.

1:31.4

I think we had a big one like last year,

1:34.1

a per-wich escalation vulnerability for the Active Directory Certificate Services.

1:39.8

So these were the disclosed or already exploited vulnerabilities.

1:44.5

Among the critical vulnerabilities, we then have Windows Kerberos remote code execution

1:50.7

vulnerability.

1:52.1

That sounds quite interesting.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.