4.9 • 696 Ratings
🗓️ 12 February 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Wednesday, February 12, 2025 edition of the SADS Internet Storm Center's Stormcast. |
0:08.9 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:14.1 | Well, and of course today we have to start with Microsoft's Patch Tuesday. |
0:19.2 | We got patches for 55 different vulnerabilities. |
0:23.7 | Three of these are critical, two already exploited, and two of the vulnerabilities have been disclosed before today. |
0:33.1 | So two technical surrethes, and then these other two could have been surre days, but at least we don't |
0:38.6 | know of any exploitation yet. Let me start with the vulnerability that varies me the most, |
0:44.8 | but that I think is also the difficult one to really assess well. And this is an arbitrary |
0:53.5 | code execution vulnerability in LDB. This vulnerability has a ton |
0:58.7 | of potential, a potential exploit would be able to essentially get to the core of what Microsoft |
1:06.5 | Windows are the case is all about, the LDAB Active Directory. And with that, pretty much any Windows authentication is all about the LDAB Active Directory. |
1:16.5 | And with that, pretty much any Windows network is potentially vulnerable. |
1:26.1 | However, at this point, we haven't really seen an exploit against this vulnerability or similar vulnerabilities that we had in prior months. Because if you remember, we had a very similar |
1:28.9 | vulnerability description last month, and I think two or three months ago, there was another |
1:34.5 | L-Dab vulnerability like that. What you really should consider at this point is, given that we |
1:41.5 | have sort of this succession of different wanted billies, |
1:45.5 | there's always a chance that there are more coming. |
1:49.2 | So keep that in mind when you're mitigating this, keep notes if you're running into any |
1:54.3 | issues with mitigation here. |
1:56.8 | And then of course, you know, what do you do to provide additional hardening for Active Directory and LDAP in your network? |
2:05.9 | Potentially, this vulnerability does not require any user interaction to exploit. |
2:12.0 | With that, it's also warmable. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.