meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, July 22nd, 2025: SharePoint Emergency Patches; How Long Does Patching Take; HPE Wifi Vuln; Zoho WorkDrive Abused

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 22 July 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771
Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability.
https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
How Quickly Are Systems Patched?
Jan took Shodan data to check how quickly recent vulnerabilities were patched. The quick answer: Not fast enough.
https://isc.sans.edu/diary/How%20quickly%20do%20we%20patch%3F%20A%20quick%20look%20from%20the%20global%20viewpoint/32126
HP Enterprise Instant On Access Points Vulnerability
HPE patched two vulnerabilities in its Instant On access points (aka Aruba). One allows for authentication bypass, while the second one enables arbitrary code execution as admin.
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us
Revealing the AppLocker Bypass Risks in The Suggested Block-list Policy
AppLocker sample policies suffer from a simple bug that may enable some rule bypass, but only if signatures are not enforced.
While reviewing Microsoft s suggested configuration, Varonis Threat Labs noticed a subtle but important issue: the MaximumFileVersion field was set to 65355 instead of the expected 65535.
https://www.varonis.com/blog/applocker-bypass-risks
Ghost Crypt Malware Leverages Zoho WorkDrive
The Ghost malware tricks users into downloading by sending links to Zoho WorkDrive locations.
https://www.esentire.com/blog/ghost-crypt-powers-purerat-with-hypnosis

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, July 22nd, 2025 edition of the Sands Internet Storm Center's Stormcast. My name is Johannes Ulrich, recording today from Jacksonville, Florida. And this episode is brought you by the sands.edu master's degree program in information security engineering.

0:24.4

And of course, well, SharePoint, let's start with that.

0:29.1

Microsoft has some nice updates about this particular problem.

0:34.4

And there are patches available now if you're using the SharePoint Server subscription edition or SharePoint server 2019.

0:38.4

For 2016, at this point, there are no updates available yet, but you are vulnerable.

0:46.2

So assume compromise at this point.

0:49.1

There are plenty of working exploits that have been made public for this particular vulnerability.

0:55.8

Also, don't be too specific in your detection rules on the payload.

1:01.2

Payloads can easily be generated using the dot-net version of WISO serial,

1:06.8

a common tool to exploit deseralsation attacks in dot-net.

1:12.8

There are also now two CVEs at 2025, 53-770, and then 53-771.

1:23.1

The first CVE is for the deserilization vulnerability.

1:28.1

The second CVE, the 71 CVE, is for the authentication bypass problem.

1:34.9

So we are back to two vulnerabilities here, but note, it only takes one request to exploit them all.

1:41.4

In order to exploit this vulnerability, you essentially first set the referrer header

1:47.9

to the sign-out page for the SharePoint instance, and that's, well, the same across

1:53.7

different versions.

1:55.8

And then you basically just include the dot-net desereralization payload as a payload to the post request.

2:04.9

Again, assume compromise when you're patching this vulnerability.

2:09.4

We'll have a bit more guidance and such probably over the next couple days as I'm able to pull a couple more details together.

2:16.8

Just the gut setting up SharePoint server to be able to pull a couple more details together, just the gut setting up SharePoint server

2:19.9

to be able to play with this vulnerability in the patch to see how well it works and if it

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.