4.9 • 696 Ratings
🗓️ 23 October 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Thursday, October 23rd, 2025 edition of the Sands Internet Storm Center's Stormcast. |
| 0:12.7 | My name is Johannes Ulrich, recording today from Jacksonville, Florida. |
| 0:17.6 | And this episode is brought you by the sands.edu graduate certificate program in |
| 0:22.8 | industrial control systems security. Our honeypots get caught a newish exploit and this one targets |
| 0:32.5 | URL webcontrol.cg.i that's typically associated with the Blue Angel software suite. |
| 0:39.6 | This is embedded software. It's often found in customer premise equipment, like routers, |
| 0:45.2 | voice over IP equipment and such. That often uses this software made by 5V technologies. |
| 0:56.8 | So it's not really sort of a household name or you may not necessarily know that your particular device runs on this software. The problem here is a basic |
| 1:04.8 | OS command injection vulnerability that's very typical for this kind of equipment. A lot of times they do have a debug feature that allows you to ping hosts from the device. |
| 1:16.6 | You of course need to provide an IP address or a host name that's then passed on the command line as part of the ping command. |
| 1:24.6 | Well, if you're not careful and that apparently is what happened here, |
| 1:28.3 | there is the possibility of injecting |
| 1:30.5 | additional operating system commands. |
| 1:33.4 | So very classic vulnerability. |
| 1:36.1 | I had a little bit of hard time assigning it |
| 1:38.3 | an exact CBE, |
| 1:40.3 | and I'm actually not sure if I got the right one here. |
| 1:44.7 | Last or this July, there was a new CVE found in this particular software suite, CVE 2025-34-033. |
| 1:54.8 | Very similar to the description to what we are seeing here. |
| 1:57.4 | However, the description of the CVE suggests a get request and also uses a |
| 2:03.4 | slightly different parameter name for the actual vulnerable parameter. But overall looks sort of like |
| 2:11.3 | the same vulnerability, possibly also in some other equipment. All these types of equipment are very similar to each other, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.