Handler on Duty: Johannes Ullrich
Threat Level: green
Podcast Detail
SANS Stormcast Tuesday, March 10th, 2026: Encrypted Client Hello; ExitTool Vulnerability;
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9842.mp3
My Next Class
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
Encrypted Client Hello: Ready for Prime Time?
https://isc.sans.edu/diary/Encrypted%20Client%20Hello%3A%20Ready%20for%20Prime%20Time%3F/32778
The ExifTool vulnerability: how an image can infect macOS systems
https://www.kaspersky.com/blog/exiftool-macos-picture-vulnerability-mitigation-cve-2026-3102/55362/
Remote code execution in Nextcloud Flow via vulnerable Windmill version
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g7vj-98x3-qvjf
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Tuesday, March 10th, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. This episode is brought to you by the SANS.edu Graduate Certificate Program in Cybersecurity Leadership. Today I noticed that last week two RFCs were published that well have been in the work for a while. And actually I thought they already had been published, but guess they were not. The first one is 9848, that's bootstrapping TLS encrypted client hello with DNS service bindings. And the second one is 9849 TLS encrypted client hello. So what this does is really it establishes a standard for encrypted TLS client hellos. This has been sort of an ongoing issue because it was sort of the one information leak that still existed in TLS as part of the client hello. The client typically will send, for example, the host name of the client it's going to connect to, which of course does remove part of the anonymity, privacy that you expect from TLS. So with this extension, it's now possible to encrypt the complete client hello. This also does prevent some fingerprinting, basically figuring out what browser or other client you may be using. There has been a prior to this proposal for encrypted server name indication that basically just encrypts the host name being communicated during the client hello. But with this proposal now, the entire client hello is being encrypted or most of it. And that of course, it solves a bigger problem and really also is not any more complicated than just encrypting the server name. So that's why server name indication got kind of deprecated and we now only have the complete client hello encryption. Now the trick with these client hello encryptions is that we somehow have to communicate the public key that's being then used for the encryption because the client hello is the first data packet being sent as part of a TLS handshake. That happens via DNS. There are two DNS types that are being used here. One is HTTPS. That's the one that you are most likely going to see because most likely you're going to see this used with HTTPS and that's already HTTPS that type comes in. And then we also have a service binding type. That one is basically for any other TLS application, not HTTPS that may take advantage of this particular feature. So, yes, the standard is out there and it has already been implemented and used for a while. Actually, that's why I was a little bit surprised that it the standard actually hadn't been released yet. Cloudflare as so often has been one of the front runners here when it comes to encrypted client hello. And if you have paid for a Cloudflare account, well, it's as simple as just checking a checkbox and you have it enabled. Now, if you're looking at it from a detection point of view, of course, it removes details from your network. You could suppress encrypted client hello if you're blocking these HTTPS or these SVDB records. With HTTPS, you will also use HTTP 3 or QUIC because that's also negotiated via these HTTPS records that may actually be in your favor. Like maybe something that you do want. So just blocking HTTPS outright may be an option for you. As so often before you block stuff, you know, make sure that it's actually in line with whatever you need for your business. And then we have a new vulnerability in EXIF tool. EXIF tool is a command line utility that usually comes on Unix systems that allows you to extract the EXIF data, basic comments and such that are being embedded in certain image formats. This can be a very useful tool, for example, to extract things like geolocation information or other metadata from a particular image. But the tool has had issues in the past and this latest vulnerability could potentially use be used for command execution. So scenarios where this particular critical is where you do have, for example, a web application or such that processes EXIF data from user submitted data and then, well, isn't doing so carefully enough. In particular here, there is the dash N option EXIF tool that does output data as it finds it. It doesn't sort of try to parse it. So when you're using that raw data mode, that will trigger this vulnerability. Kaspersky, who found a vulnerability, is particularly pointing out here that macOS systems are vulnerable because they come with the vulnerable version of EXIF tools. And so far, there hasn't been a patch. This has been a little bit of an issue with Macs in general that they're using these open source tools. But then, of course, they only sort of have these somewhat irregular patch days where they then patch all the, well, recently discovered open source vulnerabilities. And let's hope we're sort of expecting actually an update next week for macOS that they'll include an update for EXIF tool. And for anybody self-hosting cloud services, if you're using Nextcloud Flow, I highly recommend you update. There is a vulnerable windmill version in Nextcloud Flow that does leak the super admin secret, which, well, can then be used to basically authenticate as an administrator. This is part of the entire windmill users config.json file that's being leaked here. Now, a couple of things about the vulnerability announcement. It's fairly sparse, so not a lot of details here. And it doesn't really say exactly how it happens. The CVSS score of this is 8.8. In part, it doesn't make of the nine the critical range because it says that in order to exploit it, the attack vector is adjacent, which, in my opinion, usually means you have to be in the same network segment. Now, without any additional details, I can't really question that. How this happens, maybe not some kind of multicast DNS packet or so that leaks it. But I would be a little bit more careful here and definitely consider this a critical vulnerability. Well, and this is it for today. So, thanks for listening. Thanks for liking and thanks for subscribing. And talk to you again tomorrow. Bye.





