Talk With an Expert

Internet Storm Center Tech Corner

SANS ISC StormCast, Friday, January 31, 2025

Old Netgear Vuln in Depth; Lightning AI RCE; Canon Printer RCE; DeepSeek Leak

https://isc.sans.edu/podcastdetail/9304

PCAPs or It Didn't Happen: Exposing an Old Netgear Vulnerability Still Active in 2025 [Guest Diary]

https://isc.sans.edu/diary/PCAPs+or+It+Didnt+Happen+Exposing+an+Old+Netgear+Vulnerability+Still+Active+in+2025+Guest+Diary/31638

RCE Vulnerability in AI Development Platform Lightning AI

Noma Security discovered a neat remote code execution vulnerability in Lightning AI. This vulnerability is exploitable by tricking a logged in user into clicking a simple link.

https://noma.security/noma-research-discovers-rce-vulnerability-in-ai-development-platform-lightning-ai/

Canon Laser Printers and Small Office Multifunctional Printer Vulnerabilities

Canon fixed three different vulnerabilities affecting various laser and small office multifunctional printers. These vulnerabilities may lead to remote code execution, and there are some interesting exploit opportunities

https://www.usa.canon.com/support/canon-product-advisories/service-notice-regarding-vulnerability-measure-against-buffer-overflow-for-laser-printers-and-small-office-multifunctional-printers

DeepSeek ClickHouse Database Leak

https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak

SANS ISC StormCast, Thursday, January 30, 2025

Python vs. Powershell; Fortinet Exploits and Patch Policy; Voyager PHP Framework Vuln; Zyxel Targeted; VMWare AVI Patch

https://isc.sans.edu/podcastdetail/9302

From PowerShell to a Python Obfuscation Race!

This information stealer not only emulates a PDF document convincingly, but also includes its own Python environment for Windows

https://isc.sans.edu/diary/From+PowerShell+to+a+Python+Obfuscation+Race/31634

Alleged Active Exploit Sale of CVE-2024-55591 on Fortinet Devices

An exploit for this week's Fortinet vulnerability is for sale on Russian forums. Fortinet also requires patching of devices without cloud license within seven days of patch release

https://x.com/MonThreat/status/1884577840185643345

https://community.fortinet.com/t5/Support-Forum/Firmware-upgrade-policy/td-p/373376

The Tainted Voyage: Uncovering Voyager's Vulnerabilities

SonarQube identified vulnerabilities in the popular PHP package Voyager. One of them allows arbitrary file uploads.

https://www.sonarsource.com/blog/the-tainted-voyage-uncovering-voyagers-vulnerabilities/

Hackers exploit critical unpatched flaw in Zyxel CPE devices

A currently unpatched vulnerability in Zyxel devices is actively exploited.

https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-unpatched-flaw-in-zyxel-cpe-devices/

VMSA-2025-0002: VMware Avi Load Balancer addresses an unauthenticated blind SQL Injection vulnerability (CVE-2025-22217)

VMWare released a patch for the AVI Load Balancer addressing an unauthenticated blink SQL injection vulnerability.

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25346

SANS ISC StormCast, Wednesday, January 29, 2025

Learn about fileless crypto stealers written in Python; the ongoing exploitation of recent SimpleHelp vulnerabilities; new Apple Silicon Sidechannel attacks; a Team Viewer Vulnerability; and an odd QR Code

https://isc.sans.edu/podcastdetail/9300

Fileless Python InfoStealer Targeting Exodus

This Python script targets Exodus crypto wallet and password managers to steal crypto currencies. It does not save exfiltrated data in files, but keeps it in memory for exfiltration

https://isc.sans.edu/diary/Fileless+Python+InfoStealer+Targeting+Exodus/31630

Campaign Exploiting SimpleHelp Vulnerability

Arctic Wolf observed attacks exploiting SimpleHelp for initial access to networks. It has not been verified, but is assumed that vulnerabilities made public about a week ago are being exploited.

https://arcticwolf.com/resources/blog-uk/arctic-wolf-observes-campaign-exploiting-simplehelp-rmm-software-initial-access/

Two New Side Channel Vulnerabilities in Apple Silicon

SLAP (Data Speculation Attacks via Load Address Prediction): This attack exploits the Load Address Predictor in Apple CPUs starting with the M2/A15, allowing unauthorized access to sensitive data by mispredicting memory addresses. FLOP (Breaking the Apple M3 CPU via False Load Output Predictions): This attack targets the Load Value Predictor in Apple's M3/A17 CPUs, enabling attackers to execute arbitrary computations on incorrect data, potentially leaking sensitive information.

https://predictors.fail/

TeamViewer Security Bulletin

TeamViewer patched a privilege escalation vulnerability CVE-2025-0065

https://www.teamviewer.com/en-us/resources/trust-center/security-bulletins/tv-2025-1001/

Odd QR Code

A QR code may resolve to a different URL if looked at at an angle.

https://mstdn.social/@isziaui/113874436953157913

Limited Discount for SANS Baltimore

https://sans.org/u/1zQd

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive