meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 8 October 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


FreePBX Exploit Attempts (CVE-2025-57819)
A FreePBX SQL injection vulnerability disclosed in August is being used to execute code on affected systems.
https://isc.sans.edu/diary/Exploit%20Against%20FreePBX%20%28CVE-2025-57819%29%20with%20code%20execution./32350
Disrupting Threats Targeting Microsoft Teams
Microsoft published a blog post outlining how to better secure Teams.
https://www.microsoft.com/en-us/security/blog/2025/10/07/disrupting-threats-targeting-microsoft-teams/
Kibana XSS Patch CVE-2025-25009
Elastic patched a stored XSS vulnerability in Kibana
https://discuss.elastic.co/t/kibana-8-18-8-8-19-5-9-0-8-and-9-1-5-security-update-esa-2025-20/382449
QT SVG Vulnerabilities CVE-2025-10728, CVE-2025-10729,
The QT group fixed two vulnerabilities in the QT SVG module. One of the vulnerabilities may be used for code execution
https://www.qt.io/blog/security-advisory-uncontrolled-recursion-and-use-after-free-vulnerabilities-in-qt-svg-module-impact-qt

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, October 8th, 2025 edition of the Sands Internet Storm Centers.

0:11.3

Stormcast, my name is Johannes Ulrich, recording today from Denver, Colorado.

0:17.4

And this episode is brought you by the Sands.edu graduate certificate program in incident response.

0:24.7

In diaries today, I wrote about exploit attempts that we have been seen against free pbX.

0:32.0

Free pbX is the popular voice over IP system, and it had a critical vulnerability disclosed about two months ago.

0:42.6

This vulnerability had already been exploited at the time it was disclosed and yes, of course,

0:49.5

many of these free PbX systems hadn't been patched at the time.

0:54.7

What we are seeing here is an interesting way to leverage SQL injection

0:59.1

to actually achieve remote code execution.

1:03.3

Free pbx maintains a database table called gran jobs.

1:09.8

That table can be used to essentially add system Cron jobs

1:15.0

via the Cigle Injection Vulnerability. So the Cicle Injection Vulnerability is just used to

1:20.8

insert an additional row into this table, which will then launch a Cron job every minute. That Gronjob will create a file in the

1:31.9

web document root directory that just echoes back, well, that the system essentially vulnerable.

1:38.1

It does also echo back the output of new name dash A and then deletes the file, deletes itself, which I don't think

1:48.5

actually makes a big difference because the Grand Shop keeps running and will continuously

1:53.0

recreate the file. But the file, it's a PHP file, so it's only executed if it's actually

1:58.8

loaded in a browser. At this point, we haven't really seen any attempts to access this file, but our honeypots

2:06.8

aren't really sort of claiming to be vulnerable, so it's possible that the attacker figures

2:12.1

out after trying to deploy this particular file using the vulnerability that the exploit actually didn't

2:21.1

work. And Microsoft published a very extensive blog post about disrupting threats targeting Microsoft

2:29.8

Teams. In the first part of this blog post, they are discussing various threats that Teams is

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.