meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability.

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 23 October 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary


webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant?
Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite.
https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410
Oracle Critical Patch Update
Oracle released its quarterly critical patch update. The update includes patches for 374 vulnerabilities across all of Oracle s products. There are nine more patches for Oracle s e-Business Suite.
https://www.oracle.com/security-alerts/cpuoct2025.html#AppendixEBS
Rust TAR Library Vulnerability
A vulnerability in the popular, but no longer maintained, async-tar vulnerability could lead to arbitrary code execution
https://edera.dev/stories/tarmageddon

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, October 23rd, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:12.7

My name is Johannes Ulrich, recording today from Jacksonville, Florida.

0:17.6

And this episode is brought you by the sands.edu graduate certificate program in

0:22.8

industrial control systems security. Our honeypots get caught a newish exploit and this one targets

0:32.5

URL webcontrol.cg.i that's typically associated with the Blue Angel software suite.

0:39.6

This is embedded software. It's often found in customer premise equipment, like routers,

0:45.2

voice over IP equipment and such. That often uses this software made by 5V technologies.

0:56.8

So it's not really sort of a household name or you may not necessarily know that your particular device runs on this software. The problem here is a basic

1:04.8

OS command injection vulnerability that's very typical for this kind of equipment. A lot of times they do have a debug feature that allows you to ping hosts from the device.

1:16.6

You of course need to provide an IP address or a host name that's then passed on the command line as part of the ping command.

1:24.6

Well, if you're not careful and that apparently is what happened here,

1:28.3

there is the possibility of injecting

1:30.5

additional operating system commands.

1:33.4

So very classic vulnerability.

1:36.1

I had a little bit of hard time assigning it

1:38.3

an exact CBE,

1:40.3

and I'm actually not sure if I got the right one here.

1:44.7

Last or this July, there was a new CVE found in this particular software suite, CVE 2025-34-033.

1:54.8

Very similar to the description to what we are seeing here.

1:57.4

However, the description of the CVE suggests a get request and also uses a

2:03.4

slightly different parameter name for the actual vulnerable parameter. But overall looks sort of like

2:11.3

the same vulnerability, possibly also in some other equipment. All these types of equipment are very similar to each other,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.