4.9 • 696 Ratings
🗓️ 17 November 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Monday, November 17, 2025 edition of the Sands Internet Storm Center's Stormcast. |
| 0:12.8 | My name is Johannes Ulrich, recording today from Jacksonville, Florida. |
| 0:17.8 | And this episode is brought you by the Sands.edu master's degree program in information |
| 0:23.4 | security engineering. Well, the first story here is something that developed on Friday and really |
| 0:31.0 | sort of became more obvious on Friday, but there was sort of in development for the last few days before that. |
| 0:39.6 | And I'll sort of start here with the end. |
| 0:42.5 | And that's notice by 40 Net security announcement that there is a new vulnerability |
| 0:49.5 | in the 40 Web software. |
| 0:53.4 | The problem with this is that the patch, and in this case, for example, if you're on the 8 |
| 0:58.7 | version, it would be version 802, was actually released a couple weeks ago. |
| 1:04.9 | So a couple weeks ago, 4DNet did upgrade their software, fixed a critical vulnerability. |
| 1:12.6 | CVS has score of 9.1, according to 40 Net, which I think is about appropriate. |
| 1:19.6 | But they didn't tell anybody about fixing this vulnerability. |
| 1:24.9 | So what happened last week is that the researchers pointed out some attacks. |
| 1:30.4 | They saw that basically looked like a version of an old warnability. |
| 1:36.2 | But, well, it was actually this new vulnerability. |
| 1:39.7 | And we then got, as usual, good write-up from Watchtower showing that this was essentially |
| 1:47.0 | a directory traversal that allowed access to this FWB-CGI binary, that then in turn allowed |
| 1:55.3 | an attacker to impersonate arbitrary users. And in doing so, basically, bypass access control. So the vulnerability |
| 2:03.4 | was very straightforward. You just needed a JSON payload with the user that you would like |
| 2:09.2 | to impersonate. And with that, you were all set in order to then gain access to the admin interface. |
| 2:17.8 | You also, over the weekend, did notice some of these attacks in our honeypots. |
... |
Transcript will be available on the free plan in 2 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.