meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 May 2025

⏱️ 5 minutes

🧾️ Download transcript

Summary


No Internet Access: SSH to the Rescue
If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN
https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932
SAMSUNG magicINFO 9 Server Flaw Still exploitable
The SAMSUNG magicINFO 9 Server Vulnerability we found being exploited last week is apparently still not completely patched, and current versions are vulnerable to the exploit observed in the wild.
https://www.huntress.com/blog/rapid-response-samsung-magicinfo9-server-flaw
Bring Your Own Installer: Bypassing SentinelOne Through Agent Version Change Interruption
SentinelOne s installer is vulnerable to an exploit allowing attackers to shut down the end point protection software
https://www.aon.com/en/insights/cyber-labs/bring-your-own-installer-bypassing-sentinelone
Commvault Still Exploitable
A recent patch for Commvault is apparently ineffective and the PoC exploit published by watchTowr is still working against up to date patched systems
https://infosec.exchange/@wdormann/114458913006792356

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, May 9th,

0:03.0

2025 edition of the Sands Internet Stormers Stormcast.

0:07.0

My name is Johannes Ulrich, and today I'm recording from San Diego, California.

0:13.0

Well, Xavier is on a roll and we got another diary from Xavier.

0:17.0

This time, a little SSH trick.

0:20.0

The problem here was that Xavier was provided with a system that only was accessible.

0:26.4

The SSH had no outbound connectivity.

0:30.2

That was all blocked by the firewall.

0:32.6

And Xavier still had to basically reach out to a couple of websites to download additional tools.

0:40.5

This quick solution here was, well, it just used the existing S-H tunnel to connect back to an

0:46.5

HTTP proxy and from there, of course, back to the world.

0:51.3

All unique with S-ZH is one single connection and then you can use it to

0:57.0

forward ports and basically tunnel additional traffic. It's actually another thing that I've

1:02.8

used in the past a couple of times where you just run a point-to-point connection over SSH.

1:09.0

That gives you essentially a complete VPN via SSH.

1:13.8

Not quite as reliable as other VPN solutions. That's why I haven't really lately been

1:18.7

using it much. But in a pinch, if all you have is SSH, that's certainly quite useful. And I've

1:26.1

run into situations, for example, while traveling,

1:29.3

where hotel or conference center networks were quite restricted, and well, then something like

1:35.5

this is sometimes saved today. When last week, I wrote about exploits of a Samsung Magic Info9 Warnability.

1:45.8

And back then I stated that, well, this vulnerability was actually patched back last August.

1:53.0

Huntress Lab today published a blog post stating that the patch back from August probably didn't

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.