Handler on Duty: Johannes Ullrich
Threat Level: green
Podcast Detail
SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Slop; Fortinet Patches
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9786.mp3
My Next Class
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop?
We are seeing attempts to attack CVE-2026-21962, a recent weblog vulnerability, using a non-working AI slop exploit
https://isc.sans.edu/diary/Odd%20WebLogic%20Request.%20Possible%20CVE-2026-21962%20Exploit%20Attempt%20or%20AI%20Slop%3F/32662
Fortinet Patches are Rolling Out
Fortinet is starting to roll out patches for the recent SSO vulnerability
https://fortiguard.fortinet.com/psirt/FG-IR-26-060
SolarWinds Web Helpdesk Vulnerability
Another set of vulnerabilities in SolarWinds Web Helpdesk may result in unauthenticated system access
https://horizon3.ai/attack-research/cve-2025-40551-another-solarwinds-web-help-desk-deserialization-issue/
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Thursday, January 29th, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu undergraduate certificate program in cybersecurity fundamentals. Last week, Oracle published its quarterly critical patch up date. And with that, we also got a patch for WebLogic. That patch, I think I pointed out when it was released, wasn't so far noteworthy that first of all, WebLogic has been exploited many times in the past. And secondly, it got a CVSS score of 10. So a perfect score here for possible exploit attractiveness, I guess I should say, because compromising WebLogic, using this particular vulnerability could lead to a complete system compromise. So with an exploit like this, I'm usually periodically kind of trying to find any exploit attempts in our honeypot logs and did see one in our logs. But this particular exploit attempt didn't really make much sense. It had sort of all the parts that you may expect in an exploit like this, but was highly unlikely that, well, the vulnerability was as trivial as suggested by this exploit. So doing a little bit further digging, apparently, at the time when the vulnerability was disclosed by Oracle, someone published a GitHub repository with what looks like AI-generated exploit that apparently doesn't work at all. And we are now seeing this exploit being used against basically arbitrary hosts. It's not just being sent against WebLogic, but really just random hosts. And well, I guess to some extent, nice if attackers are wasting the time with AI slob like this. But on the other hand, what's really happening here is that both defenders and attackers are using AI trying to speed up their development process either of signatures or of attack scripts like what we saw here. And the result is, well, that sometimes either side wastes time. Now, in this case, the attacker sort of has the advantage that all they do is waste time. If you're relying on AI-generated signatures with the same quality, then, of course, you're potentially opening yourself up to real exploits. And reading some of the write-ups that were sort of published back when the exploit was released as fake exploit, it looks like a number of security companies actually use that sort of as a potential template for their defensive actions and signatures. So definitely be a bit careful with this. And Fortinet updated its advisory for the single sign-off. Non -warnability, they start rolling out patches now. Looks like right now they're rolling them only out for the 7.4 version of FortiAnalyzer, Manager, and OS. Other patches are supposed to be available shortly. Also, nothing yet for FortiWeb. But keep watching it. And I would expect sort of by the end of the week we probably will have most of the patches for these different vulnerable versions. I'll leave it up to you if you want to then be brave and turn single sign-on on again, or if you just want to try to do without it. Remember, this is the second time that we sort of had this fire trail with the single sign-on feature. And yes, it's time to patch your SolarWinds web help desk again. This time three different security vulnerabilities. One sort of a variation of stuff that has been patched before. But the end effect is that non -authenticated hacker will be able to gain full remote code execution on your web help desk instance. At the core of it, it's a deserialization vulnerability that allows for the code execution now to be able to exploit this vulnerability. You can take advantage of static sort of a guest or example credentials that are being set up as you are creating your web help desk instance. And then there's also a security protection bypass that will essentially allow you to bypass some the filters that have been added in the past to prevent exploitation of these types of deserialization of vulnerabilities. So definitely something that you must patch. Horizon 3 has published a blog post and a link to it in the show notes that has quite a bit of detail short of proof of concept for this particular vulnerability. But they did release, for example, a scanner that you can use to check if you're vulnerable and also indicators of compromise that you may see in your logs to show that exploit attempts have happened. Well, in addition to this, there are a couple other things that we don't really have time to cover. N8n vulnerabilities. We also do have another vulnerability in Google Chrome that has been patched and a critical sandbox escape vulnerability in VM2. So for the Node.js coders here. That's it for today. Thanks for listening. Thanks for subscribing and talk to you again tomorrow. Bye.





