meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Stormcast, Jan 14 2025: Microsoft Patch Tuesday, FortiOS and FortiProxy Patches; Paessler PRTG Patches

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 15 January 2025

⏱️ 8 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS ISC Stormcast, Jan 14 2025: Microsoft Patch Tuesday, FortiOS and FortiProxy Patches; Paessler PRTG Patches

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, January 15th, 2025 edition of the Sands and a

0:07.6

storm center's Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville,

0:13.5

Florida. Well, today, of course, we have to start with our Patch Tuesday review. Microsoft released updates for 209 vulnerabilities. I think that's quite a bit higher than what we usually see.

0:27.9

Twelve of these vulnerabilities are classified as critical. Five have been disclosed prior to today.

0:35.1

And then we also have three vulnerabilities that were actively exploited,

0:39.9

making them seraday vulnerabilities. So let's start with some of these seraday vulnerabilities.

0:47.5

Now, all the already exploited vulnerabilities do affect Microsoft access, and there are actually

0:53.2

three distinct remote code execution vulnerabilities

0:56.9

that are being addressed with this update.

1:01.0

They're only rated as important,

1:02.9

which is a little bit odd for remote code execution vulnerabilities.

1:05.6

But there is a reason behind this in order to exploit the vulnerability.

1:09.8

The attacker actually has to convince the user to

1:12.9

open a file in Microsoft Access. So this is more like some of these office vulnerabilities

1:20.9

or such where the victim has to open a document, which is less likely also with access. And the patch actually just blocks some of these malicious or potentially malicious

1:33.1

document types that could be used for code execution.

1:39.8

And out of the five already disclosed vulnerabilities, three are assigned to Microsoft Access.

1:48.0

Haven't really run into Access in quite a while, but I'm sure it's still around.

1:53.4

And in this case, it could lead to remote code execution.

1:57.1

Microsoft only rates these vulnerabilities as important.

2:01.7

Haven't really seen access of being exposed a lot.

2:05.4

Way back in the day a couple times with web applications,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.