meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches.

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 December 2025

⏱️ 8 minutes

🧾️ Download transcript

Summary


Microsoft Patch Tuesday
Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws.
https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550
Adobe Patches
Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon.
https://helpx.adobe.com/security.html
Ivanti Endpoint Manager Patches
Ivanti patched four vulnerabilities in End Point Manager.
https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US
Fortinet FortiCloud SSO Vulnerability
Due to a cryptographic vulnerability, Forinet s FortiCloud SSO authentication is bypassable.
https://fortiguard.fortinet.com/psirt/FG-IR-25-647
ruby-saml vulnerability
Ruby fixed a vulnerability in ruby-saml. The issue is due to an incomplete patch for another vulnerability a few months ago.
https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-9v8j-x534-2fx3

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, December 10th, 2025 edition of the Sands and Internet Storms Centers.

0:11.7

Stormcast, my name is Johannes Orich, recording today from Jacksonville, Florida.

0:17.4

And this episode is brought you by the Sands.edu bachelor's security program in Applied Cybersecurity.

0:25.2

Well, today, of course, lots of patches to talk about.

0:28.6

And first of all, Microsoft's Patch Tuesday for December.

0:33.4

It was a lighter patch Tuesday.

0:35.8

Only 57 vulnerabilities being addressed here.

0:39.3

Only three of these vulnerabilities were rated as critical.

0:43.2

And then we had one vulnerability that's already being exploited and two that are publicly disclosed.

0:49.9

Now, about the already being exploited vulnerability, that is Peruvage escalation vulnerability

0:56.2

in the Microsoft Cloud Files Mini Filters, Driver, so one of those driver issues, and yes,

1:02.6

that's already being exploited, but again, only Peruvish escalation vulnerability.

1:08.6

The publicly known but not yet exploited vulnerabilities is, well, actually the first one, invoke web request, a power shell function that's often used maliciously, but of course, also in benign scripts. The problem here is that by default, you may actually execute code here.

1:28.5

So there is this use basic parsing parameter.

1:32.5

And what they changed here was that if you just use invoke web request,

1:37.6

you'll actually get a warning telling you that you are here at the risk of actually executing code

1:42.5

unless you add the use basic parsing parameter.

1:47.1

So really just clarified how to use this particular PowerShell function.

1:53.0

And then the second already known vulnerability, it's a really sort of a class of vulnerabilities

1:57.3

that we have seen, of course, quite frequently lately. And that's all these

2:02.3

AI co-pilots as you let them take over your IDE, your development environment. You, of course,

2:09.4

run the risk that they'll overstep their bounds and will actually execute code. And of course,

...

Transcript will be available on the free plan in 25 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.