meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday April 14th: Langlow AI Attacks; Fortinet Attack Cleanup; MSFT Inetpub;

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 14 April 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary


Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248)
After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability.
https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253248/31850/
Fortinet Analysis of Threat Actor Activity
Fortinet oberved recent vulnerablities in its devices being used to add a symlink to ease future compromise. The symlink is not removed by prior patches, and Fortinet released additional updates to detect and remove this attack artifact.
https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity
MSFT Inetpub
Microsoft clarrified that its April patches created the inetpub directory on purpose. Users should not remove it.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204#exploitability
SANSFIRE
https://isc.sans.edu/j/sansfire

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, April 14th, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:08.5

My name is Johannes Ulrich, and today I'm recording from Orlando, Florida.

0:14.1

Well, I think on Friday I briefly mentioned a vulnerability in Langflow where we saw at the time a single exploit attempt. Since then,

0:24.1

the number of exploit attempts has skyrocketed. I think we have about a thousand now that we

0:28.8

have captured some of them with their payload. All of these requests come from Tor's endpoints,

0:36.7

as far as I've been able to tell. There may be a couple

0:39.3

that I missed, but that sort of indicates that it's a little bit different botnet. If it is a

0:45.9

botnet at all, that's not doing the scanning, more likely sort of a single source that just

0:51.1

obfuscates itself behind Tor. The payload that we have seen so far exclusively

0:58.7

and we don't capture payloads for all requests is a simple check for Etsy password, which

1:05.5

has the cat Etsy password. That's the command they are executing. Likely, it's just to check if a particular

1:11.4

system is vulnerable to this particular issue. Now, a little bit of background here. This

1:18.3

vulnerability in Langflow was originally discovered by Horizon 3. Horizon 3 late last week did

1:25.6

publish a blog post with details, including a proof of concept

1:29.0

exploit. The exploit, once you see it, is pretty straightforward. The vulnerability has been

1:36.5

patched about two weeks ago, like end of March, a bi-length flow. However, they never quite

1:42.1

acknowledged it as a vulnerability. The root cause is a particular

1:46.6

API endpoint that's essentially not authenticated and that then allows for this remote code

1:53.8

execution where you essentially inject arbitrary Python code that's executed by Langflow.

2:01.3

Now, Langflow itself is a tool that's been used by GenDic AI, meaning that it's used to

2:06.9

essentially orchestrate different AI tools and then also tools that execute on what

2:12.4

the AI outputs.

...

Transcript will be available on the free plan in 9 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.