Episode Transcript
Hey guys.
Speaker 2So you know I run every day for twenty minutes.
Speaker 3I didn't know that.
Speaker 1Yeah, good for you.
Speaker 2If I miss a day, I add twenty minutes to the next day.
So this has truly been a game changer because tomorrow I'm supposed to run for four months.
Speaker 1That adds up.
Speaker 3That does add up.
Yeah, that's good.
Speaker 2All right.
So we got some interesting stories this week, you know, some of the usual stuff and some not so usual.
Sonic wall fixes actively exploited.
Uh CVA four oh six oh two in SMA one hundred appliances, right, what happened here?
Speaker 1So there's so you know what's interesting.
We've talked about these before, these Sonic walls.
These are their secure mobile access devices.
They're literally for mobile.
Speaker 3Well they can't say that name.
Speaker 1How many cvees have to be assigned before they force you to rip secure up that.
Speaker 2Yeah, so they used to be smad.
Now they're just mad.
Speaker 1Yeah mad, So we'll just call them mobile access access devices.
The vulnerability is tracked as CVE twenty twenty five forty sixty two and it is a local privilege.
I can't I can't say it.
I can't.
Speaker 2There a time is a charm doing it.
Speaker 1Here we go.
This vulnerability is tracked as CVE twenty twenty five forty sixty two, and this is a local privileged escalation that comes from insufficient authorization in the Application Management Console what they call the a MC.
So if you're tracking this, you definitely want to go and see to make sure that you're signing if you're still using the secure mobile access device, you want to make sure that this is actually out there and patched.
Speaker 3And it's actively being exploited.
Speaker 1It is actively being exploited.
It is funny.
If you reach to this article, it says the vulnerability was reported to be leveraged in combination with CV twenty twenty five twenty three double oh six, which is an unauthenticated remote code execution with root privileges.
So there's a bunch of CVEs in here.
If you haven't patched in a while, and I know we've talked about them on the show before, right, but yeah, you if you are running an SMA one hundred, uh, throw it out.
No, go patch, Go patch.
That's probably the best advice.
Speaker 4I mean, firewall so dangerously that if there was one thing you need to watch to patch as soon as a patch comes out it's it's a firewall, mm because I mean by definition it has to be on the outside, it has to be accessible.
Speaker 1Due so we yeah, we're gonna We're gonna see in a couple of these articles here where external devices were being hacked because certain things were exposed that shouldn't be.
But that's not the case with this one, so we'll leave it alone.
Speaker 2But I agree, right, are we at the point yet where we can subscribe to a service and tell it all the divice that we have and it will notify us when there are cvees or known exploits so that they don't have to listen to us anymore and they can just you know, get those notifications and go patch.
Speaker 4I'm sure there is something.
I just don't know of one that's got a reputation.
Speaker 1So I've seen them individually as in like you can install aigents on PCs, almost like an inventory management system.
YEA, say you're running this software whatever.
I haven't seen it as a technology stack yet.
Speaker 2Should we build one?
Speaker 1You know what, We'll create one?
Done, yeah, next week.
Speaker 4Honestly, I think this is a feature that should be built into our s bomb.
Speaker 1No, Patrick, it's done.
We're atting it.
We're creating it.
Good dude.
Speaker 4S bomb has not arrived yet either, so I'm not like stealing from you.
Speaker 1Security this Week's approved.
Speaker 2Yeah, so we should combine the S bomb with the patch notifier.
Speaker 3Great, that's what I'm saying.
Speaker 2I think that's what and they'll call it the Security this Week package and we'll charge exarvant amounts of money for it, and there you go.
Speaker 1Nobody will do on that way.
Yes, our three listeners may buy it.
Speaker 2Okay, moving on from help net security.
Attackers are exploiting off bypass vulnerability on forty gate firewalls.
Our old friend Fortinet.
Speaker 3Well we have to this is the Firewall episode.
Speaker 1It is so yeah.
Speaker 2Fortinet was originally a firewall company, right yep, and then they started adding all these things, and we were making fun of them because they were getting all these vulnerabilities and their extra stuff.
But this is actually in their main product, right yeah.
Speaker 1Yeah.
Attackers are exploiting the cve twenty twenty five five nine seven one eight.
We haven't broken this down in a little while.
The way the cvees work, obviously, it's a common vulnerability.
That means that it's out there and ubiquitous.
Doesn't necessarily mean it's being exploited, although sometimes we will say on this show, this is being actively exploited, which means it's been picked up by Arctic Wolf, for it's been picked up by you know, the Google tag group or whatever.
So in this particular one, we are actually active seeing this being exploited.
The beginning part of the CVE obviously CVE Common Vulnerability, but the next part, twenty twenty five, is the year it was founded.
So in some of these articles we talk about today, you're gonna like see CVE twenty double o nine and you go, okay, well this is weird.
This that means this was found it.
You know, we they found this, I don't know, like years ago, over a decade ago, and it's like, yeah they did, just nobody patched it, and it's it's being actively exploited in the field.
But this one is from this year.
And then the last number, the fifty nine to seven to one eight is literally just a sequence of numbers.
They usually grow, So beginning of the year is gonna have a smaller number, end of the year's gonna have a large number.
Right, So, just so you know how to track these things and where they came from, so this one is from this year.
But what's interesting about this is there's actually two cvees talked about in this article, fifty nine seven eighteen and fifty nine seven nineteen.
Here again, see that number is only one incremented off right, So generally these are pretty sequential numbers.
One affects forty OS.
Forty OS is the operating system that runs on the forty eight firewalls and forty switches and forty proxy and so on and so forth.
It's kind of their it's their iOS, right, it's their general operating system that runs on everything.
And then they have they have another CD that that applies to their web application of firewalls.
Speaker 4So we used to be standardized on forty GATE and when they first came out, they were actually pretty far ahead of things.
They seem like they're in the news way too much.
Is it that they But a lot of times it's not their firewall.
In this case, it is it's their.
Speaker 2Yeah that just mentioned that.
Speaker 4Yeah, So I'm just wondering, Well, I'm leading up to something.
What I'm what I'm wondering is whether or not we would recommend this to anybody, or whether this is starting to become very last passy.
Speaker 1Well, so that's a good question if you tear this exploit apart.
The way this is working is ford Net, like you had said, started off with a firewall.
They were like, yay, we do firewalls.
Great, and then they said, let's do email, and let's do remote access, and let's do et cetera, et cetera, et cetera, et cetera.
Speaker 4Right, and the surface area goes up because every product we hear Fordinet and it's not there.
Speaker 3It's not their firewall.
Speaker 1So right, right, absolutely.
But then then you say, okay, well, now we have a bunch of different devices that do a bunch of different things.
Wouldn't it be convenient if an administrator could log into one of them and have single sign on.
So let's do single sign on.
But let's not use Google, let's not use Microsoft.
Let's use the forty sso the four to cloud single sign on.
So you create an account with FOD to cloud, and now you can single sign on to all the Fordinet devices.
And that first stuff is not turned on by default.
You'd have to have multiple devices to have the pain of logging into each of them to go, oh my god, I wish there was a single sign on, right, But if you turn it on, that's when the CVEs come into play.
So this really is the devices themselves, in some way may be secure, but whoever implemented their single sign on implementation.
Speaker 3Which is like rolling your own encryption.
Speaker 1Did something wrong that allowed these to be.
Speaker 2Patrick, it is Patrick.
If you wanted to ask me how I would know if Fordnet has jumped the shark, I would look at their hires and fires for the last three years.
Speaker 1Oh, that's a good idea.
Speaker 2I would look to see who's left, who got fired, and who they hired, and I'd want to look at their cvs.
Speaker 3Almost as if you've been in technology for a while.
Speaker 2Yeah, I mean that's really the only way to get the true story.
I mean they could be hemorrhaging money and hiring interns.
They could be using AI to build stuff.
They could you know.
Speaker 1Oh this, oh speaking of AI.
This gets way worse when AI than vibe coding comes out.
I was talking, I was talking talking to a buddy of mine who said, you just came back from a QA conference and they had done a bunch of statistics on like obviously unit testing and all sorts of stuff, and they saw that they had announced that security vulnerabilities and applications regular developer verse vibe coding went up four hundred percent.
Speaker 2Yeah, I believe it.
Speaker 1Good for business, bad for you, good for business.
Speaker 2I believe it.
What if you have smart developers that use AI to do stuff they can do but just don't want to.
Speaker 1So, I honestly think that's the sweet spot.
Yeah, you have a really bright, experienced developer.
They will get things done faster, but they'll know the right questions to ask right right, like oh where are you where are you storing these espisodetokens, or so how are you you know?
Speaker 3I refer you back to the early Sequel days.
Speaker 4Remember when Oracle databases were run by a qualified certified administrator and Sequel was run by the receptionists.
Speaker 5Cool against like us, the person who is standing closest to the database when it crack.
Speaker 4What happened was I had visits where I'd do consulting runs and I'd be like, yeah, I just don't trust these SQL servers because that we have data and tables just go missing.
And I found out the company had four hundred scientists with essay access.
Speaker 2Oh yeah, to the data oh good lord.
Speaker 4And they're like, I don't need that data, we don't need that table, and they.
Speaker 1Delete a table and it would just like there was an Excel tab.
We're in those days.
Speaker 4Yeah, that's that's where we are right now.
Yep, you are here, and it's good.
It is good for business for us.
But what you need to do is take the best all your developers need to use AI to get better.
And one of the dangers is to only keep your best developer and get rid of all the entry level people, because then we won't have any people.
Speaker 2And I have a message to all the Vibe coders out there who are junior developers or who don't have a lot of experience, ask the AI to comment every line of code.
Speaker 1Yes, you might.
Speaker 2Not be able to read it, but somebody else will and it will help them catch problems.
Speaker 1That is a fantastic suggestion, Carl, thank you, because then even like as a junior developers, you look through the lines of code, you understand what they're doing right, and it's easy if it says, hey, this line of code will authenticate the user in store their clear text password and a cookie, and then you'll be like, like, logically, you can be like, that's a terrible idea.
Let's not do that, right, So, yeah, I agree one hundred percent.
Speaker 4Well, you can also take I love this idea.
You can take those comments and have them stripped out as a narrative and say another, AI, find me the problems or potential problems and.
Speaker 1There, and especially when you start looking at architecture, like okay, architecturally with all this reaching out to SSO and databases and whatever.
Speaker 2Right, and if you're really brave, you can say rate me as a secure developer from one to ten use decimals.
Speaker 3There a number below zero.
Speaker 4Ooh, I still lose sleep, and I still think that we need to address it.
We had a story on the show many months ago, it might have been even many a year ago now, where there was a vulnerability and an encryption library, and it turned out that the code was right, but the compiler made a mistake and simplified the code to put a loop in that made it vulnerable.
I think AI is going to help us with that kind of thing, and I think that thing is much more rampant than we think, but I think we're not.
We got to get over this hill, and I think that hill might take years for us to get over before we get to the benefits.
Speaker 1Yeah, well said, yeah, it's going to be busy.
We're going to start the other thing we're going to see, I think.
Unfortunately, you guys remember Cobol, right, yeah.
Speaker 2Well yeah, actually I wrote some cobyl in college.
Yeah.
Speaker 1So Cobol and visual Basic to a lesser extent were advertised as the business programming language.
Right.
It was like anybody can be a programmer in the eighties, you just program in Visual Basic.
Little look we drag a button of the screen and look at that, right, And we saw it in the mid nineties, late nineties, we saw a lot of code that was very bad from usage ability, but from also just a maintainability from a security sense.
Speaker 2And all the real programmers mock the Visual Basic programmers for being toy, you know.
Speaker 1And still do it to this day.
Yeah.
So, but you know, we saw that where it was like the technology to allow people to write programs had accelerated past the general populations understanding to write programs.
Right, So everybody started writing these programs that lasted I don't know, ten years before we started really taking a close look at it and saying, okay, now we need to take a look at the code, and we need to start cleaning up and that sort of stuff.
So I think we'll see AI vibe coding code out on the internet for a while.
That's my prediction.
Okay, So buckle up.
Speaker 2Buckle up, boys and girls.
All right, Hacker News says free pbx patches critical seql I file upload and off type bypass flaws enabling remote code execution.
All right, First of all, what's free PBX?
Speaker 1So for all of you who remember pots lines, oh yeah.
Speaker 4Telephone all the hackers, all the hackers, just right.
Speaker 1Uh So PBX is yeah, I know, right, Uh.
PBX is private branch exchange.
It's uh, you know, generally a way of doing voice over IP and that switching and switching and that sort of stuff.
Yep, absolutely so in this particular case, I'm astounded.
I don't remember the last time I've seen three CVEs associated with the same piece as software that are all above eight point six.
Speaker 2Wow.
Speaker 1It's yeah, like they have numerous authentication sequel injection vulnerabilities, like.
Speaker 2Well, obviously somebody did an analysis of this product and found out three of these things at once.
Speaker 1Absolutely, and they were there to find yes, yeah right, yeah, yeah, I mean, but that also means it was developed with no eye towards sequel injection right at all, especially if they found numerous in the log in field.
It's not like, well I did some sort of capture the page and change the language and blah blah blah.
With a blind sequel injection.
It was like, oh, I did my user name is one?
You know tick or one equals one dash dash and huh in right, So yeah, too simple.
Speaker 2And I would mention just to reiterate this is an open source project.
Speaker 1Yes, yeah, Well that's interesting too, being that it is an open source project.
Speaker 2Right, I mean, you know, nobody caught it until now, right?
Does any do they do they say when these flaws were exposed?
Speaker 1Ah?
So well, actually that's a great question.
Speaker 4What would be also interesting is if we found out who wrote them and whether they were written and placed.
Speaker 3In there by someone.
Speaker 1Well that's a good question.
Speaker 4I mean, maybe these aren't, but but it would be interesting to go back and look when you see a CVE in an open source project, whether it's it's foreign actors that are trying to get vulnerability in there.
Speaker 2You guys should be in forensics.
Oh wait a minute, you kindamar all right.
Speaker 1We do a lot of forensics to make sure that nobody can find us when we're hacking and anyways.
So so if we take a look at at the prior vulnerability we were talking about with Sonic Wall, that one was twenty twenty five forty sixty two.
So if you take a look at this one, these are twenty twenty five sixty one sixty seven five.
So these are a lot newer than that Sonic Wall, probably in the last month or two.
You can look them up.
They'll tell you the dates when they were issued.
Actually, I can probably click.
I want to tell you it was blah blah blah blah blah.
This was October.
These were found right and fixed in October.
And you may say to yourself, well, shoot, why were these found in October and fixed in October?
And we're just hearing about these now.
The process of disclosure to the company and or in this case an open source project, and then having a fix made, and then having a patch built and then having it I mean, it just it takes time.
Right, There's a reason that there's a ninety day disclosure window.
So yeah, that's the case.
But not only do you have SQL injection that was apparently available in eleven different parameters.
Speaker 2Wow.
Speaker 1You also had an authentic You had the ability to if you authenticated, which look at number one, I can bypass authentication.
But if you authenticated, you could arbitrarily upload and download file so I could pull down PHP sessions, I could pull down the Etsy password file.
I could do all sorts of things there they call those lfi's local file includes where I can actually pull data off of the system.
And then there was also another authentication bypass where you could manipulate the server and get off bypassed.
So there's there were several issues in here, the last one rating a nine point three wow.
Speaker 2Wow wow.
All right, Well, on that note, let's take a break.
We'll be right back after these very important messages.
Stick around and we're back.
It's Code with AI.
I'm Carl Franklin.
It's Twaynela Flott and Patrick Hines.
Hello boys, Hello, Hello, helloo.
All right.
Next story hacker news SISA adds actively exploited Sierra wireless router flaw enabling remote code execution attacks.
Hmmm, does not sound good.
No Sierra Wireless.
Speaker 4So just to reiorate the US cyber security infrastructure security Agency or SISA is a really good source of understanding what's going on.
So whenever they stop talk, it's it's worthy to listen to what they're saying.
Speaker 2Didn't they get defunded though?
Are they back in business?
Speaker 1Briefly?
They did for a little while, but then yeah they're back.
Speaker 2Yeah good.
Speaker 3Yeah.
Speaker 4So they keep what's called the k EV catalog, which is the known exploited vulnerability, So basically, things that we know are out there so that you should pay extra attention to them.
So that's what this is saying, is that there's a there's an eight point eight you know to nine point nine scored vulnerability that they're saying they're seeing against here.
Whiless that's actually being.
Speaker 1Exploited now here is what I'm going to say.
Let's come back to our CVE.
The CVE is CVE DASH twenty eighteen dash four oh sixty three.
Wow, So what does that mean.
Speaker 2At the end of twenty eighteen, that's when they found this.
Speaker 1Yeah, bugs, this has been around for nine years.
Geez, this has been patched.
This has been done for nine Like, why why at this point is.
Speaker 2SISSA well six years right?
Speaker 1Uh twenty eighteen?
Yeah, six years?
Okay, I'm already in the next year.
Well, yeah, I know, right, So two years, twenty eighteen, twenty twenty five, yeah, you know whatever, it's close enough.
Almost we spend spend seven years, spen almost seven years, yeah, call it eight.
Okay, So this is this was patched like eight years ago.
How is it not only have people Well, first off, how is it people are still using these eight years later?
Exactly, I have very little technology in my house that's over eight years old.
But secondly, that means these people haven't patched in eight years.
And thirdly, it's it's important enough where the United States Cybersecurity and Infrastructure Security Agency had to make public comment and be like, guys, seriously, health you have to take care of this.
Speaker 3Health care.
Speaker 1I'm sorry, are you okay?
Over there?
Patrick?
Do you need to see a doctor?
Speaker 2It's healthcare.
Speaker 3We've all seen I do after this story.
Speaker 4We've all seen Windows XP systems controlling MRIs and other mistresses, and it's like it's you know, it's part of a kit probably or it's part of But if I had to bet, if I had to put like, you know, a big wager down and uh and risk having to buy Carl wine and steak.
I would probably bet on healthcare being the zone.
Speaker 2You do that anyway, wouldn't you?
Speaker 3I do?
Speaker 2Speaking of which, when's our next dinner coming up?
Speaker 4Oh?
Speaker 3We got to figure that out.
Speaker 2Yeah, after the holidays, after the holidays.
Speaker 1Yeah.
Speaker 2So it's this is embarrassing, it really is.
I guess that's all we got to say.
Speaker 1Ah.
Yeah, So if you're using one of these devices, throw it out.
Speaker 3Don't use it, or as Dwayne would say, it's delicious.
Speaker 2Yeah.
Speaker 1So honestly, I don't hack any targets that old.
I don't.
I don't know what's going.
Speaker 4Yeah.
Speaker 1I don't allow old old sites.
I like the fresh stuff, the new, fresh stuff.
Speaker 2All right.
So, next story from Hacker News, Cisco warns of active attacks exploiting unpatched zero day.
That's redundant, isn't it?
Unpatched zero day?
Speaker 1Right?
And thank you Carl, thank you.
Speaker 2In ace see I can learn exploding unpatched zero day in asinc os email security appliances or insecurity appliances in this case.
Speaker 1Right as it as it may be.
Yeah, so there's no patch, right, and this is where people are like, well, what do I do with it?
Why are you even telling me?
So there's a couple different reasons.
One, if you read through this Cisco article, it says that the appliance this only is an issue if you have turned on Now remember this is an email security appliance.
If you turn on spam quarantining, one would think that's on by default, but it is not.
But if you turn it on, and if that spam quarantining feature is accessible to the Internet, which would be weird if you could only check your quarantine outside only in the building inside, Yeah, and couldn't check it from the internet.
But apparently those aren't defaults.
But if you got it used in and configured in a useful way, yeah, then you have issues.
But you may have to turn off that external access to the spam quarantine at least for now.
Yeah, or China will start cleaning up your spam because that's the advanced persistent threat you at nine six eighty six is in there trying to do things and stuff.
Speaker 2You know, after we record every episode, I want to hire Dwayne to just come to my business, my house, whatever and just unscrew my systems.
Right, And it's you're expensive, you guys.
Speaker 1So we should be worth it.
We should be.
Speaker 2Running some software for people to do this.
You really should, especially with AI now that we could probably vibe code without four increase in security business model.
Speaker 1Well, you're a shaper.
Speaker 4Me and Dwayne thought like, you know, this cybersecurity thing is interesting.
But you know, once everybody knows about sequel injection, what's left to do?
Speaker 3Yeah?
Speaker 1Yeah, yeah, this was back in two thousand.
Speaker 2Yeah, come on, everybody's gonna address this now.
Speaker 4Of course, of course it's twenty eighteen.
Of course you're going to patch your stuff.
Speaker 1Yep.
Speaker 2Yeah, right, all right, well, congratulations on a continuing business model.
All right, shall we get to the main story here.
Speaker 5Porn Hub I'm sorry, porn Hub extorted after hackers steal premium member activity data.
Speaker 2Now, let me just ask you a question.
If you're a premium member of porn hub, what's wrong with you anyway?
I mean, don't you know that porn hub is a free site.
What are you gonna get as a premium member?
I'm not sure, Carl, that isn't going to satisfy your purean intro rists from the free stuff.
Right, Actually, on second thought, don't answer that.
Don't email me, please, please don't answer that.
Speaker 1I don't please.
Speaker 2Yeah, So maybe if you're a premium member, the stuff that you're looking at is embarrassing if it actually gets.
Speaker 1You know, it's funny.
We were joking about this before where normally I tell people like I get these calls all the time where it's like, oh my god.
You know, I'll have somebody pull me aside at a party whereever and be like, hey, I got a cyber question for you, and I'm like, yeah, what's up.
And I'll be like, I got this email.
There's this guy who knows what I've been looking at on the internet and he wants bitcoin, what do we do?
And I was like, delete it because it's not true.
It's like, honestly, it's just it's a scam.
They do this to see what percentage of people will reply right now.
Speaker 2Actually, and once you reply, now they actually know that you've got something to hide, that you've been doing something.
Speaker 3Are you a premium member?
Speaker 1On I got a question for you?
Speaker 3So Bill, let me understand this premium member.
Speaker 1What's your what's your predilection?
Speaker 2For what you were talking about, Dwayne is kind of like going up to your doctor, like when at a doctors when the door is shut in Saint Dog, I need something for Ed said, Oh, why didn't you just tell the secretary?
Hey, why don't we just tell her?
Now?
Speaker 1Yeah, first off, it is crazy the things you hear is a cyber professional.
But yeah, and sometimes it's just like like, hey, at night, my TV shuts off every day at five?
Is that an Is that a hacker?
It's probably a poor teenager.
Turn it on.
Speaker 4It's at nine and it just times out.
Speaker 1It's just it's normal, all right, So tell us.
Speaker 2What really happened here?
I mean I kind of get it from the headline, but.
Speaker 1Yeah, so this but this one actually is a little bit deeper in that porn Hub actually uses third party vendors, and one of the third party vendors they use is called Mixpanel, who is not a third party vender of theirs anymore.
But they did not delete any of the customer's data.
So when mix Panel got broken into.
Speaker 3They kept all the data.
Speaker 1They stole all this old data that they found on Pornhub because which.
Speaker 4Is absolutely against the contract.
Any competent lawyer would have had them signed.
Speaker 1You would hope.
So yeah, absolutely, And this this goes back on, This goes back on both companies.
Like if porn hub had signed this contract with mix Panel, and in the contract they said we can keep your data forever, right, or there was no clause saying when you remove our data, like when we're not a customer anymore, you remove our data.
Well, then that's on porn hub, right, you know.
That sucks.
But they should have they should have been done their due diligence on the vendors that they use, or when they terminated the contract, they should have said, hey, you have to remove our data, right, it's part of us terminating.
But then it's also on mix Panel that they apparently didn't either.
In this case, it was a smishing attack.
This is social engineering.
They don't do training for their users.
They don't teach them how to, you know, not click on things and answer questions.
They shouldn't that sort of stuff.
Who knows, right, So I think both parties can be culpable.
Yeah, but yeah, this is a this is a vendor attack, thirty third party vendor attack, which kind of sucks.
Speaker 2So we're not really exonerating porn hub here now.
Even though it wasn't them that the data got stolen from, they still had their hand in them.
Speaker 4I mean, yeah, is there a chance that they got reassurances that their data was deleted by this vendor, and they.
Speaker 1Lied entirely possible.
Yeah, entirely possible.
The vendor was like, yeah, you know, oh yeah, we removed that and it was on some developers workstation or whatever.
Speaker 2You know.
I think to get to the bottom of this, we looked to have to look at the hirings and firings over the last three years.
Speaker 1Both companies.
Speaker 3There's a lot of ambers and.
Speaker 2Quality of porn Hub employees goes way down twenty twenty three.
Speaker 1On that note.
Speaker 2On that note, all right, well, those are all the stories from last week and we'll see you next week on security this week, Bye bye, bye, guys,
