meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Wednesday, November 12th, 2025: Microsoft Patch Tuesday; Gladinet Triofox Vulnerability; SAP Patches

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 12 November 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


Microsoft Patch Tuesday for November 2025
https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/
Gladinet Triofox Vulnerability
Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost.
https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480/
SAP November 2025 Patch Day
SAP fixed a critical vulnerability, fixed default credentials in its SQL Anywhere Monitor
https://onapsis.com/blog/sap-security-patch-day-november-2025/
Ivanti Endpoint Manager Updates
https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2025-for-EPM-2024?language=en_US

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, November 12, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:12.4

My name is Johannes Ulrich, recording today from Jacksonville, Florida.

0:17.5

And this episode is brought you by the Sands.edu graduate certificate program in cyber defense

0:23.4

operations. And of course, today we have to start with Microsoft's patch Tuesday. Microsoft

0:31.0

patched, according to our account, 80 different vulnerabilities, seen others come up with 60-something

0:37.3

vulnerabilities. Again, that all depends

0:39.4

on what you're exactly counting here. If some of the edge vulnerabilities are really chromium

0:45.0

vulnerabilities are being included or not. But either way, we got one vulnerability that is

0:51.4

actually actively being exploited and, that Microsoft rated critical.

0:57.3

So first, let's start with the actively exploited vulnerability. That's actually just an

1:02.0

important vulnerability. It's a privilege escalation vulnerability in the Windows kernel.

1:07.4

We had plenty of them before, so wouldn't really get too overly excited about them.

1:13.0

They're usually parts of more complex attack chains, but by themselves, these vulnerabilities,

1:18.9

because we had so many of them in the past, are relatively straightforward to exploit for

1:24.3

an attacker. Looking at some of the critical vulnerabilities,

1:28.9

we do have a remote code execution vulnerability in GDI Plus.

1:33.3

The reason I emphasize this one particular is

1:36.7

because pretty much any image being rendered at some point goes through GDI Plus.

1:42.1

So there's a huge attack surface here,

1:44.4

and this is definitely a vulnerability that you need to watch.

1:48.3

There was also a second, a little bit similar vulnerability,

1:52.3

a DirectX vulnerability,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.