ISC StormCast for Tuesday, January 7th, 2025

ISC StormCast for Tuesday, January 7th, 2025

Update: 2025-01-07
Share

Description

In this episode of the SANS Internet Storm Center's Stormcast, we cover critical vulnerabilities affecting OpenSSH, BeyondTrust, and Nuclei, including the newly discovered "RegreSSHion" flaw and a bypass vulnerability in Nuclei. We also discuss how malware evasion techniques can impact analysis environments and highlight the dangers of fake exploits targeting researchers. Tune in for insights on patching, mitigation strategies, and staying ahead of emerging threats.

Topics Covered:

Make Malware Happy

https://isc.sans.edu/diary/Make%20Malware%20Happy/31560

A look at how malware adapts and detects analysis environments, and why replicating operational settings is critical during malware analysis.

Nuclei Signature Verification Bypass (CVE-2024-43405)

https://www.wiz.io/blog/nuclei-signature-verification-bypass

A critical vulnerability in Nuclei allows malicious templates to bypass signature verification, risking arbitrary code execution.

Critical Vulnerability in BeyondTrust (CVE-2024-12356)

https://censys.com/cve-2024-12356/

A high-risk flaw in BeyondTrust products allows unauthenticated OS command execution, posing a significant threat to privileged access systems.

RegreSSHion Code Execution Vulnerability (CVE-2024-6387)

https://cybersecuritynews.com/regresshion-code-execution-vulnerability/

OpenSSH vulnerability "RegreSSHion" enables remote code execution, and fake exploits targeting security researchers are in circulation.
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

ISC StormCast for Tuesday, January 7th, 2025

ISC StormCast for Tuesday, January 7th, 2025

Dr. Johannes B. Ullrich