meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 December 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, December 9th, 2025 edition of the Sands

0:10.1

and then at Storm Center's Stormcast. My name is Johannes Ulrich, recording today from

0:15.3

Jacksonville, Florida. And this episode is brought you by the Sands.edu credit certificate program in Purple Team Operations.

0:24.5

I would imagine that many of you listening have seen a device being advertised, the nano-KBM.

0:30.7

KVM stands for keyboard, video, and mouse switcher, which is a little IP-accessible device that gives you remote access to the keyboard,

0:39.6

video and mouse of a particular device that you connected to. Now, this device does not scream

0:46.1

secure. It screams cheap and it's advertised as the cheapest possible device to accomplish this

0:52.7

IP access to your keyboard and video screen.

0:57.3

So a little cheap way to get basically remote access to a system, even if like power fails

1:03.2

and the like.

1:04.3

Which is definitely something nice to have.

1:07.7

And I have actually one here at home and I've been playing with it, and definitely

1:11.6

it works. But of course, the security aspect here comes in, in particular, since the device

1:17.1

has had a number of clearing security faults, like bad hashing and encryption of passwords,

1:24.5

things like an SSH server is enabled by default with default password, and

1:29.5

researchers had had a hard time to convince the maker to fix some of these vulnerabilities.

1:34.6

The latest issue is that the entire firmware update process is insecure, in particular

1:41.4

the update of a binary blob, that's sort of the proprietary part of these

1:46.9

devices. So that, of course, opens up the possibility of evil updates being slipped in here.

1:55.5

The other thing that came out this week was that the motherboard

2:00.8

of the device includes a microphone

2:03.1

with no obvious reason

...

Transcript will be available on the free plan in 24 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.