Handler on Duty: Guy Bruneau
Threat Level: green
Podcast Detail
SANS Stormcast ThursdayApril 10th: Getting Past PyArmor; CenterStack RCE; Android 0-Day Patch; VMware Tanzu Patches; Odd Win11 Directory; WhatsApp File Confusion; SANS AI Guide;
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9402.mp3

Getting Past PyArmor; CenterStack RCE; Android 0-Day Patch; VMware Tanzu Patches; Odd Win11 Directory; WhatsApp File Confusion; SANS AI Guide;
00:00
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Getting Past PyArmor
PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work.
https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840
CenterStack RCE CVE-2025-30406
Gladinet’s CenterStack secure file-sharing software suffers from an inadequately protected machine key vulnerability that can be used to modify ViewState data. This vulnerability may lead to remote code execution, which is already exploited.
https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf
Google Patches two zero-day vulnerabilities CVE-2024-53150 CVE-2024-53197
Google released its monthly patches for Android. Two of the patched vulnerabilities are already exploited. One of them was used by Serbian law enforcement.
https://www.malwarebytes.com/blog/news/2025/04/google-fixes-two-actively-exploited-zero-day-vulnerabilities-in-android
Broadcom VMWare Tenzu Updates
Broadcom released updates for VMWare Tenzu. Many vulnerabilities affect the backup component and allow for arbitrary command execution.
https://support.broadcom.com/web/ecx/security-advisory?
Windows 11 April Update ads inetpub directory
The April Windows 11 update appears to create a new /inetpub directory. It is unclear why, and removing it appears to have no bad effects.
https://www.bleepingcomputer.com/news/microsoft/windows-11-april-update-unexpectedly-creates-new-inetpub-folder/
WhatsApp File Type Confusion/Spoofing
WhatsApp patched a file type confusion vulnerability. A victim may be tricked into downloading n
https://www.whatsapp.com/security/advisories/2025/
SANS Critical AI Security Guidelines
https://www.sans.org/mlp/critical-ai-security-guidelines
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Apr 13th - Apr 18th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 5th - May 10th 2025 |
Network Monitoring and Threat Detection In-Depth | Baltimore | Jun 2nd - Jun 7th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 14th - Jul 19th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Podcast Transcript
Hello and welcome to the Thursday, April 10th, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich and today I'm recording from Jacksonville, Florida. Xavier today wrote about obfuscated Python. In this particular case, the exploit first arrived as a simple script that I used PowerShell to download additional Python. Now, what was different about this particular Python script here is that it used PyArmor in order to obfuscate the code. And while Xavier isn't here going through it sort of line by line based on the obfuscation, he at least does show some techniques to get some partial content from the script by doing some behavioral analysis. The problem here again is that the script also doesn't really run in sandboxes very well. So certainly making analysis of these scripts more difficult. PyArmor itself is not necessarily malicious. It's often used for commercial Python scripts in order to obfuscate the inner workings for intellectual property protection and the like. But if anybody has any tips here for Xavier how to better deal with PyArmor obfuscated scripts, well, please let him know. And we have an interesting vulnerability in CenterStack. CenterStack is made by Gladinet and it's a product that allows you to expose various file shares like SMB and such via a simple to use web interface. Now this web interface is written in .NET. .NET, you probably have seen it, has these view states. View states may be signed by the server using a machine key. The problem here with CenterStack is that the machine key wasn't properly protected. It's actually a not so terribly unusual vulnerability for these types of applications that rely on the view state being protected by a machine key. The vulnerability is now addressed with a patch. The patch also creates a new machine key for us. However, the vulnerability has already been exploited for a few weeks. They're saying sometime in March exploitation started or at least started to be detected for this vulnerability. So definitely apply this update quickly. And then we got updates from Google for Android. This update fixes 62 different vulnerabilities. Two USB -related vulnerabilities are of particular interest here in that they're both being exploited. One is allowing access to confidential data. The other one in the USB audio component apparently is what Malwarebytes, who has done a little write-up on these two exploit vulnerabilities. So that USB audio component vulnerability was apparently used by Serbian law enforcement to gain access to locked Android phones. Definitely want to address these and update your phone as the particular update is becoming available for your particular Android device. And Broadcom released updates for VMware Tanzu. Now VMware Tanzu has nothing really to do with their virtualization product. It's part of their business intelligence product. It also includes a backup product. And that's where a lot of the vulnerabilities are located are being patched here. 47 vulnerabilities total, 29 of which apply to the backup and restore component of VMware Tanzu. Many of these vulnerabilities do allow remote code execution. So definitely something that you do want to address quickly. And according to Bleeping Computer, some users are reporting all for a sudden seeing an inetpub directory on their Windows systems after installing the latest Windows 11 update. This directory is usually used by IIS, by the Internet Information Server, in order to serve files. That component was not installed or enabled on those systems. So for whatever reason, Microsoft decided to create that directory. At this point, it appears to be safe to remove that directory. But overall, it shouldn't really have any impact. There's, of course, a slight chance that if you start putting files in there and then later expose these files via installing IIS, you may have a problem. So probably the safe thing to do is just to remove that directory if it's empty, if it's not already used for other purposes on your system. And if you're using WhatsApp, be aware there is a file spoofing vulnerability that was being addressed in WhatsApp. The problem here is that an attacker may send you a file that looks like a harmless image, like a PNG, but actually then turns out to be an executable once saved to your system. And SANS released a new document, the Critical AI Security Guidelines. Now, it's version 1.1, but even though it's labeled as version 1.1, it's pretty much, very much sort of a document in flux, a living document summarizing what you need to do in order to protect your AI workflows. This document still is waiting for user input as well. Given that AI moves so fast, I think it would be just wrong to release something that is considered sort of done and ready as is. So take a look at it. I'll, of course, add a link to the show notes. And if anybody's interested, on Friday, I'll actually be speaking for an ISSA event here in Jacksonville. It'll be a little bit an encore of the sort of Internet Storm Center run-through I did for InfraGuard a couple weeks ago if anybody's interested. Also link in the show notes if you want to register. And that's it for today. Thanks for listening and talk to you again tomorrow. Bye.