Handler on Duty: Johannes Ullrich
Threat Level: green
Podcast Detail
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9566.mp3

Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;
00:00
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Denver | Oct 4th - Oct 9th 2025 |
Erlang OTP SSH Exploits
A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed.
https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/
WinRAR Exploited
WinRAR vulnerabilities are actively being exploited by a number of threat actors. The vulnerability allows for the creation of arbitrary files as the archive is extracted.
https://thehackernews.com/2025/08/winrar-zero-day-under-active.html
Citrix Netscaler Exploit Updates
The Dutch Center for Cyber Security is updating its guidance on recent Citrix Netscaler attacks. Note that the attacks started before a patch became available, and attackers are actively hiding their tracks to make it more difficult to detect a compromise.
https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/
OpenSSH Post Quantum Encryption
Starting in version 10.1, OpenSSH will warn users if they are using quantum-unsafe algorithms
https://www.openssh.com/pq.html
Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 22nd - Sep 27th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Denver | Oct 4th - Oct 9th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Dallas | Dec 1st - Dec 6th 2025 |
Podcast Transcript
Hello and welcome to the Tuesday, August 12, 2025 edition of the SANS Internet Storm Centers Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Graduate Certificate Program in Cyber Defense Operations. Well, ahead of Patch Tuesday, I do want to take a bit of a different spin here and talk about a couple of vulnerabilities that became known as being exploited the last couple of days. All of these vulnerabilities have patches available. So these are not strictly speaking zero days, but still some of these patches are relatively new. The first one here is the vulnerability in the Erlang OTP variant of SSH. OTP here stands for Open Telecom Platform, and that's where you often find this version of SSH. There is a number of Cisco devices that run Erlang OTP SSH. So those are the kind of devices where you have to be careful and that you must patch. When I talked about the patch and the vulnerability as it was released, the exploit is actually relatively straightforward. So no big surprise that it is being exploited in the wild. And Palo Alto here collected some of the evidence that they found and how it is being exploited in the wild right now. So definitely something that you must patch now. And if you have devices that are exposed that are using this version of SSH, well please make sure that you are also checking them for any existing compromise. Rotate password, rotate any seeds for two -factor authentication. Well another already exploited vulnerability is a vulnerability in Winnera or before version 7.12. This vulnerability was patched end of June and it's one of those classic decompression vulnerabilities where an attacker can create an archive that once it's being decompressed or extracted it creates files in unexpected locations by creatively selecting these locations and attacker is able to then potentially execute arbitrary code. Update WinRAR but this is one of those tricky ones where WinRAR also some of the components DLLs may be embedded, may be included in another software. So definitely inventory can be a bit of a challenge here. And the Dutch National Cyber Security Center has released some updates regarding Citrix vulnerability that was also patched end of June but actually had been exploited before the patch was released. This is your classic Citrix Netscaler issue. What they are pointing out here again is that attackers that are attacking this vulnerability are actively hiding their tracks. So you have to be really careful here to actually evict the attackers permanently from your systems. Remember all of the issues we had recently with some of the firewall compromise and such where it wasn't really clear if it was a new vulnerability or just sort of back doors or stolen credentials left behind from an old vulnerability. That's also by earlier mentioned when about the SSH vulnerability always change credentials, change seats for one-time factor or one-time passwords and two-factor authentication. And yeah definitely assume the system has been compromised if you see a vulnerable exposed system and the vulnerability has been known for a while or has known to be exploited for a while. And OpenSSH is doubling down on pushing post -quantum cryptography. Current versions of OpenSSH in use are usually 9.6, 9.9. Nothing wrong with these versions. They actually do support at least 9.9 already quantum safe encryption algorithms but they are doing so as an option not by default. Starting with OpenSSH 10 which I don't think is in any sort of major Linux distribution or such yet. These post-quantum cryptography algorithms have become the default and in 10.1 which is just being released it now will warn you if you're using an algorithm that is not yet quantum safe. So this is an interesting push here by the OpenSSH project. They always have been a little bit sort of trying to be at the forefront of good crypto practices and nothing wrong with this. Just if you're seeing the warning it may not be possible for you to actually apply these algorithms if the server you're connecting to does not support them. And that depends of course on the version of OpenSSH running there. IoT devices and the like are often behind on SSH versions and there can sometimes be challenging and you may have to set up some exceptions where you're still using some weaker ciphers and key exchanges. Well and this is it for today. So thanks again for listening. Thanks for liking and subscribing to this podcast and talk to you again tomorrow. Bye. Bye. Bye. Bye.