Handler on Duty: Jim Clausing
Threat Level: green
Podcast Detail
SANS Stormcast: Securing the Edge; PostgreSQL Exploit; Ivanti Exploit; WinZip Vulnerablity; Xerox Patch
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9328.mp3

Securing the Edge; PostgreSQL Exploit; Ivanti Exploit; WinZip Vulnerablity; Xerox Patch
00:00
My Next Class
Network Monitoring and Threat Detection In-Depth | Baltimore | Mar 3rd - Mar 8th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
My Very Personal Guidance and Strategies to Protect Network Edge Devices
A quick summary to help you secure edge devices. This may be a bit opinionated, but these are the strategies that I find work and are actionable.
https://isc.sans.edu/diary/My%20Very%20Personal%20Guidance%20and%20Strategies%20to%20Protect%20Network%20Edge%20Devices/31660
PostgreSQL SQL Injection
A followup to yesterday's segment about the PostgreSQL vulnerability. Rapid7 released a Metasploit module to exploit the vulnerability.
https://github.com/rapid7/metasploit-framework/pull/19877
Ivanti Connect Secure Exploited
The Japanese CERT observed exploitation of January's Connect Secure vulnerability
https://blogs.jpcert.or.jp/ja/2025/02/spawnchimera.html
WinZip Vulnerability
WinZip patched a buffer overflow vulenrability that may be triggered by malicious 7Z files
https://www.zerodayinitiative.com/advisories/ZDI-25-047/
Xerox Printer Patch
Xerox patched two vulnerabililites in its enterprise multifunction printers that may be exploited for lateral movement.
https://securitydocs.business.xerox.com/wp-content/uploads/2025/02/Xerox-Security-Bulletin-XRX25-003-for-Xerox-VersaLinkPhaser-and-WorkCentre.pdf
Network Monitoring and Threat Detection In-Depth | Baltimore | Mar 3rd - Mar 8th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Podcast Transcript
Hello and welcome to the Tuesday, February 18th, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida. Well, today's diary was a little bit more of an opinion piece, but with a practical background. And that's we are seeing so many vulnerabilities in these edge devices. CISA and a couple of other international, also government agencies, did come up with their guidance. I found it a little bit too abstract in some ways, so I wanted to distill it down in particular with sort of a small, medium-sized business background. And what you can do to really make an impact here and reduce your attack surface. And that's really one of the big things is reduce your attack surface. Don't expose those admin interfaces. Expose as little as possible. Never expose a web application that you don't have to expose. Simple SSH access, maybe a VPN like OpenVPN or WireGuard or whatever your preferred VPN technology is. And even at that, you know, leave it at one VPN technology. Don't have like two or three exposed. That'll make life so much easier. And then, of course, patching and such follows. But that then becomes a little bit less important. And it's one of those things where you don't have to be quite behind it to really get stuff updated as quickly as possible if you're not exposing a lot of these vulnerable services. Well, take a look. Any feedback here is very welcome. If there is anything that you would do different or maybe rank here a little bit different, let me know. And then a little bit of an update to the Postgres vulnerability that I talked about yesterday. That vulnerability, well, there is a Metasploit module out for it. So consider it already being exploited. Forgot to mention that yesterday. But given that Rapid7, the original write-up and Rapid7 is the company behind Metasploit, no surprise that they also came out with a Metasploit module to exploit this vulnerability. And the Japanese cert is reporting that they're seeing exploits against vulnerability in Ivanti Insecure Connect. This vulnerability was originally disclosed and patched in January. The particular botnet that the Japanese cert is observing here, they're calling it Spawn, or this particular vulnerability Spawn Chimera is what they're calling it. Not sure if it goes by any other names. The advisory from the Japanese cert is only in Japanese. I'll still link to it, probably with Google Translate and such. You'll still be able to make sense of it. Interestingly, this particular exploit also patches the vulnerability for you. Now, it does not use the original patch. This particular vulnerability is a buffer overflow. So they're actually just hooking into the string and copy function, limiting it to 256 bytes. That way, they're preventing the buffer overflow from being exploited. And if you have more buffer overflow vulnerabilities in compression software, this time it's WinSIP's turn. When it decompresses 7-zip formatted compressed files, it may encounter a buffer overflow that then leads to arbitrary code execution. A patch was released. If you're running WinSIP version 29 or later, you should be good. And Xerox fixed a couple of vulnerabilities in its enterprise Brenners. We all love Brenners and the vulnerabilities they bring us. The one interesting vulnerability here, I think, is a credential interception vulnerability with SMB and FTP where essentially it's possible to intercept NTLM hashes. Patches are available for these Brenners. And again, these are over there, Enterprise class multifunction devices slash Brenners. Well, and that's it for today. Thanks for listening. A little bit shorter today. Just too cold here for the full five minutes. So thanks and talk to you again tomorrow. Bye.