Podcast Detail

SANS Stormcast Tuesday, July 22nd, 2025: SharePoint Emergency Patches; How Long Does Patching Take; HPE Wifi Vuln; Zoho WorkDrive Abused

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9536.mp3

Podcast Logo
SharePoint Emergency Patches; How Long Does Patching Take; HPE Wifi Vuln; Zoho WorkDrive Abused
00:00

Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771
Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability.
https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/

How Quickly Are Systems Patched?
Jan took Shodan data to check how quickly recent vulnerabilities were patched. The quick answer: Not fast enough.
https://isc.sans.edu/diary/How%20quickly%20do%20we%20patch%3F%20A%20quick%20look%20from%20the%20global%20viewpoint/32126

HP Enterprise Instant On Access Points Vulnerability
HPE patched two vulnerabilities in its Instant On access points (aka Aruba). One allows for authentication bypass, while the second one enables arbitrary code execution as admin.
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us

Revealing the AppLocker Bypass Risks in The Suggested Block-list Policy
AppLocker sample policies suffer from a simple bug that may enable some rule bypass, but only if signatures are not enforced.
While reviewing Microsoft’s suggested configuration, Varonis Threat Labs noticed a subtle but important issue: the MaximumFileVersion field was set to 65355 instead of the expected 65535.  
https://www.varonis.com/blog/applocker-bypass-risks

Ghost Crypt Malware Leverages Zoho WorkDrive
The Ghost malware tricks users into downloading by sending links to Zoho WorkDrive locations.
https://www.esentire.com/blog/ghost-crypt-powers-purerat-with-hypnosis

Podcast Transcript

 Hello and welcome to the Tuesday, July 22nd, 2025
 edition of the SANS Internet Storm Center's Stormcast. My
 name is Johannes Ullrich, recording today from
 Jacksonville, Florida. And this episode is brought to you
 by the SANS.edu Master's Degree Program in Information
 Security Engineering. And of course, well, SharePoint,
 let's start with that. Microsoft has some nice
 updates about this particular problem. And there are patches
 available now if you're using the SharePoint Server
 Subscription Edition or SharePoint Server 2019. For
 2016, at this point, there are no updates available yet, but
 you are vulnerable. So assume compromise at this point.
 There are plenty of working exploits that have been made
 public for this particular vulnerability. Also, don't be
 too specific in your detection rules on the payload. Payloads
 can easily be generated using the .NET version of YSO
 Serial, a common tool to exploit deserialization
 attacks in .NET. There are also now two CVEs, 2025, 53,
 770, and then 53, 771. The first CVE is for the
 deserialization vulnerability. The second CVE, the 771 CVE,
 is for the authentication bypass problem. So we are back
 to two vulnerabilities here. But note, it only takes one
 request to exploit them all. In order to exploit this
 vulnerability, you essentially first set the referrer header
 to the signout page for the SharePoint instance. And
 that's, well, the same across different versions. And then
 you basically just include the .NET deserialization payload
 as a payload to the POST request. Again, assume
 compromise when you're patching this vulnerability.
 We'll have a bit more guidance and such probably over the
 next couple days as I'm able to pull a couple more details
 together. Just got setting up a SharePoint server to be able
 to play with this vulnerability in the patch to
 see how well it works and if it defends adequately against
 the exploits that are currently going around. And
 whenever we do have a critical vulnerability like SharePoint,
 it sort of takes over the news cycle, there is a danger that
 you're missing out on some of the important but not quite as
 visible vulnerabilities. One, for example, being two
 vulnerabilities that HP patched in its instant-on
 access points. These are what's known as Aruba based on
 the brand that HP bought access points. And there are
 two vulnerabilities here. One is an authentication bypass
 vulnerability. The second one is a remote code execution
 vulnerability, but it requires admin access. However, given
 that we do have that authentication bypass
 vulnerability, if you combine the two, you get full remote
 code execution as administrator. And yes,
 patches are available from HP. And security company Verones
 found an interesting and almost a funny little bug in
 AppLocker policies. So AppLocker is the Windows tool
 that allows you to block the execution of untrusted
 binaries. You may essentially have sort of an allow list or
 application control list that allows only specific binaries
 to run. Now, if you're blocking a particular binary,
 there is a sample policy that is often used, and it
 specifies the minimum and maximum file version. File
 versions are in AppLocker specified as four numbers.
 Each number may have up to 16 bits. Well, in the example,
 the maximum file version is 65 ,355, while the largest
 possible 16-bit number is 65 ,535. So not 355. So there are
 about 200 version numbers here missing. And that sort of
 opens an attacker up to basically release a version
 with one of these very high version numbers, and then
 bypass the block list. However, as pointed out in the
 article by Verones, you should also enforce application
 signatures for your AppLocker configuration, and that would
 then basically prevent the malicious binary still from
 running because, well, it's not properly signed. And it's
 not just free file transfer services that are being abused
 by attacker. ZOHO WorkDrive has written up an interesting
 event where they found the ghost crypt malware being
 distributed via ZOHO WorkDrive. ZOHO WorkDrive is a
 commercial feature by ZOHO. Of course, a lot of smaller
 businesses such use and trust ZOHO, so they're more likely
 then to actually download these malicious files than,
 let's say, from some kind of random download server that we
 often see like some kind of free file sharing service.
 Definitely something to mention awareness. And if
 you're writing any detection rules and such, be careful
 with excluding services like this. Yes, these are not
 malicious services, but they may very well be abused by
 malicious actors. In order to deliver files like this. Well,
 and this is it for today. So thanks again for listening and
 talk to you again tomorrow. Bye.