Handler on Duty: Brad Duncan
Threat Level: green
Podcast Detail
SANS Stormcast Friday, April 17th, 2026: DVRs Again; Cisco Again; Windows Defender Again; Sonatype
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9896.mp3
My Next Class
Click HERE to learn more about classes Johannes is teaching for SANS
Compromised DVRs and Finding Them in the Wild
https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Compromised%20DVRs%20and%20Finding%20Them%20in%20the%20Wild/32886
Cisco ISE RCE Vulnerability and WebEx Auth Bypass CVE-2026-20184 CVE-2026-20180 CVE-2026-20186
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL
Windows Defender 0-Day (RedSun)
https://github.com/Nightmare-Eclipse/RedSun
Sonatype Vulnerability CVE-2026-5189
https://support.sonatype.com/hc/en-us/articles/50817138825491-CVE-2026-5189-Nexus-Repository-3-Hardcoded-Credential-in-Internal-Database-Component-2026-04-15
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Friday, April 17, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Stockheim, Germany. This episode is brought to you by the SANS.edu Graduate Certificate Program in Purple Team Operations. Congratulations. Before starting this podcast, I did a quick look to see when we first talked about DVRs, digital video recorders, getting compromised at scale. And this was about 12 years ago in 2014. One of the sad things about doing this kind of work for so long is that often the problem isn't of the flashy new stuff, but what I often call the mosquitoes of the internet. They're around everywhere. They're really annoying, but sometimes deadly. And that's these IoT devices and these video devices that are still being attacked. We do have a diary by one of our interns, Alec Jaffe, just dissecting one of these attacks yet again. And yes, there are still thousands of these devices exposed and the same number pretty much being attached to Alec's Botnet here that he found. Well, take a look at his work. It is evolving. There are ever so often some little tweaks they're making to their software, but ultimately the old thing still applies. If you're connecting a system to the internet with a well-known password, well, it's going to get compromised within probably less than a minute. So let's talk about something new and exciting. Well, imagine that we do have still Cisco vulnerabilities. First one, WebEx. WebEx apparently doesn't care what certificate was used to sign your single sign-on assertion. So anybody is let in and you're easily able to impersonate arbitrary users. But it's not just WebEx where we have problems. It's also the Cisco identity services engine that is suffering from, in this case, remote code execution vulnerabilities. This has a base CSS score of 9.9, but I believe NetHacker at least needs read access here. But, well, that is then easily elevated to root privileges if this particular vulnerability isn't patched. So, yeah, still kind of old-style vulnerabilities and still happening today. And when Microsoft released its patches last Tuesday, it also patched the Bluehammer vulnerability. This was the vulnerability vulnerability that was already disclosed before the patch came out. It was a vulnerability, a privilege escalation vulnerability in Microsoft Windows Defender. Well, the author of Bluehammer, who originally released the proof of concept because this particular author wasn't happy with how Microsoft's Windows Defender is a responsible notification program worked. So this individual now released a second vulnerability in Microsoft Windows Defender, this time called Red Sun. And it's sort of one of those file override vulnerabilities. Pretty interesting. And as this write-up also says, funny. So, yes, we still have bridge escalation vulnerabilities in the Windows Defender. And sadly, bridge escalation vulnerabilities are kind of common in anti-malware all the time. When I started this podcast with what I refer to as the mosquitoes of the internet, which, well, is these cheap IoT devices like DVRs with default passwords, could possibly not apply to the data. And the leader of secure development, Sonatype. Sonatype just patched a hard -coded credential in internal database component vulnerability. This vulnerability applies to its OrientDB database, which usually is not enabled by default unless you're running it in legacy HAC mode, which then has this very obvious setting nexus.clustered equals true in its configuration. So in this case, OrientDB will be enabled and listening. Definitely something to watch out for. So if you are running the Sonatype components here, double check that, first of all, they're not reachable from the network, just like your cheap DVRs. Don't expose your security orchestration software here directly to the internet. And yes, please keep it patched. Well, that's it for today. So thanks again for listening. Thanks for liking and subscribing to this podcast. I'm on my way to Amsterdam next week, Tuesday evening. I'll be giving a talk at the SANS event in Amsterdam. If you're interested in attending, please don't just show up, but let me know if you're not already registered for the event. I'll also be teaching in May in San Diego, end of June in Riyadh, and then in July again, we have SANS Fire coming up in Washington DC. Already starting to plan a lot of United Storm Center related events as usual for SANS Fire. Thanks everybody and talk to you again on Monday. Bye.





