Handler on Duty: Johannes Ullrich
Threat Level: green
Podcast Detail
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability.
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9668.mp3
My Next Class
Application Security: Securing Web Apps, APIs, and Microservices | Dallas | Dec 1st - Dec 6th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant?
Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite.
https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410
Oracle Critical Patch Update
Oracle released its quarterly critical patch update. The update includes patches for 374 vulnerabilities across all of Oracle’s products. There are nine more patches for Oracle’s e-Business Suite.
https://www.oracle.com/security-alerts/cpuoct2025.html#AppendixEBS
Rust TAR Library Vulnerability
A vulnerability in the popular, but no longer maintained, async-tar vulnerability could lead to arbitrary code execution
https://edera.dev/stories/tarmageddon
Application Security: Securing Web Apps, APIs, and Microservices | Dallas | Dec 1st - Dec 6th 2025 |
Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
Podcast Transcript
Hello and welcome to the Thursday, October 23rd, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu graduate certificate program in industrial control systems security. Our honeypots, again, caught a newish exploit. And this one targets URL webcontrol.cgi that's typically associated with the Blue Angel software suite. This is embedded software. It's often found in customer premise equipment like routers, voice over IP equipment and such that often uses this software made by 5Vtechnologies. So it's not really sort of a household name or you may not necessarily know that your particular device runs on this software. The problem here is a basic OS command injection vulnerability. That's very typical for this kind of equipment. A lot of times they do have a debug feature that allows you to ping hosts from the device. You, of course, need to provide an IP address or a host name that's then passed on the command line as part of the ping command. Well, if you're not careful, and that apparently is what happened here, there is the possibility of injecting additional operating system commands. So very classic vulnerability. I had a little bit of hard time assigning it an exact CVE and I'm actually not sure if I got the right one here. Last or this July, there was a new CVE found in this particular software suite, CVE 2025-34033. Very similar to description to what we are seeing here. However, the description of this CVE suggests a GET request and also uses a slightly different parameter name for the actual warnable parameter. But overall looks sort of like the same vulnerability, possibly also in some other equipment. All these types of equipment are very similar to each other. So it's sometimes really difficult to find the perfect match here for the CVE. If someone knows a better match, well, please let me know. And Oracle released its quarterly critical patch update or CPU for October 2025. This particular update fixes 374 different vulnerabilities across Oracle's entire product portfolio. I counted about 135. I think it was affected products. Oracle's portfolio is rather large. Of course, big attention this month on Oracle eBusiness Suite if there's anything new here. Now, the early patches that we received over the last couple of weeks are not included in this critical patch update. Instead, we got a total of nine new vulnerabilities here in Oracle eBusiness Suite. Two of them are critical with a CVSS base score of 9.8. Overall, there are a number of additional 9.8 vulnerabilities here across the different Oracle products. Many of them are related to a vulnerability in SQLite. So this is a known vulnerability in SQLite that is now being patched in Oracle's products who are using this open source database. Other than that, nothing really too outrageously critical here that I can tell. Like I said, there are these 9.8 vulnerabilities. But aside from that, yes, a patch, of course. But as always, these Oracle patches you want to treat with care and not just rush them out, but carefully test them. And we have yet another vulnerability in a library that deals with Torfiles. The vulnerability itself is actually not really that remarkable. We had this in other libraries too. There is sort of a fundamental problem with Torfiles. There are sort of redundant ways to specify the content of the file, either with the U-star or PAX header. The problem is if they don't agree, then it's possible to essentially smuggle files in and overwrite arbitrary files if the software on tar'ing and expanding the tar file isn't dealing carefully with this mismatching information. Like I said, this has happened in other languages as well. A couple of interesting things about this particular case. First of all, it's in a Rust library. Now, Rust is advertised as a more security -focused language. And it is more security-focused when it comes to memory management. Any other vulnerabilities like these logic issues we have here with parsing these TAR file headers, well, Rust is really neutral in that respect and not any worse or better than any other language. The other problem here, and it's sadly a somewhat common problem, is that the affected libraries here are no longer maintained. So, Async TAR is no longer maintained. Tokyo TAR is no longer maintained. And with that, of course, it becomes really difficult to fix these flaws, in particular since these libraries are very widely used in various software products. Now, the discoverer here did a good job in notifying affected software. And then basically it's up to the users to then patch the particular library in their particular product. I hope that this will also kind of lead to the project being revived maybe. The other thing here is also if you are creating any kind of open source project, any project like this, try to add the contact information where someone can reach out in case of a security issue. For GitHub, there is like the security.md file that's often being used. There is the famous security.txt file on websites that I still don't really see as widely used as it should be used. So, make sure researchers who find these vulnerabilities can find you. Should it have had a special name here, Tarmageddon, and the logo? Probably not, but still good work here by the researchers, in particular when it came to disclosure of this vulnerability. Well, and that's it for today. So, thanks for listening. Thanks for liking and subscribing to this podcast. And talk to you again tomorrow. Bye. Bye. Bye.