Handler on Duty: Xavier Mertens
Threat Level: green
Podcast Detail
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9736.mp3
My Next Class
| Network Monitoring and Threat Detection In-Depth | Online | Central European Time | Dec 15th - Dec 20th 2025 |
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
Using AI Gemma 3 Locally with a Single CPU
Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise
https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556
“Mystery” Google Chrome 0-Day Vulnerability
Google released an update for Google Chrome fixing a vulnerability that is already being exploited, but has not CVE number assigned to it yet
https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html
SOAPwn: Pwning NET Framework Applications Through HTTP Client Proxies And WSDL
Watchtwr identified a common vulnerability in SOAP implementations using .Net
https://labs.watchtowr.com/soapwn-pwning-net-framework-applications-through-http-client-proxies-and-wsdl/
| Network Monitoring and Threat Detection In-Depth | Online | Central European Time | Dec 15th - Dec 20th 2025 |
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
Podcast Transcript
Hello and welcome to the Friday December 12th, 2025 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ulrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Graduate Certificate Program in Cybersecurity Engineering. AI, of course, is the big issue that everybody is worried about and playing with these days. And well, as a first touch point, you usually just use one of the public models like ChatGPT and such to get a little bit experience with what these tools can do. But it can be quite intimidating to go a step further and try to run some of these models locally and play sort of in a more intimate atmosphere with these particular models. Well, Guy now wrote up a quick diary showing how to install Gamma 3 on a reasonably small home computer. In this particular case, he used one of the new Horizon chips and one of those mini computers that have become quite popular these days for home labs and shows a couple of the pitfalls here, some of the problems that he ran into trying to make this all run in the Proxmox virtualization environment and how to configure it. And then in the end, also how to use these tools. Certainly an interesting experiment and something that gives you a little bit more insight in how these tools sort of work on the backend. And then we do have an update for Chrome with yet another already exploited vulnerability being addressed here. And this vulnerability was, well, by some described a little bit sort of as a mystery vulnerability. And it's certainly a little bit an odd one in that there is no CVE number for this vulnerability. There's also absolutely no detail what it's all about. Now, Google usually at least sort of has these one liners that describe a little bit something about the vulnerability. But here it just says that's under coordination. What I believe is happening here, and that's where the coordination part comes from, that this particular vulnerability likely affects not just Google Chrome, there are likely either other browsers, maybe it's one of the underlying libraries that's vulnerable here that is being exploited. So what's possibly happening is that they first need to coordinate with other vendors who are also affected by this issue. before they're going to release any additional details and before a CVE number will be signed. Also doesn't state who actually reported this vulnerability. So will be interesting. Maybe next week we'll learn more about this vulnerability. Until then, just keep Chrome updated. Well, this week we already had a couple SOAP related stories. We have now one more from watchTowr Labs and that's SOAP Pwn or SOAP Pwn, however you pronounce this, which is I think sort of a must read article for anybody who is developing in dotnet. Also pen testers probably want to take a close look at this. The problem here is a fundamental weakness in how dotnet deals with HTTP requests or URL requests I should say and how this may actually lead in some cases to arbitrary file write or even to remote code execution vulnerabilities. In particular as SOAP is being implemented. So SOAP is the enterprise API language. And one of the problems here is that if an attacker can control the URL that a user is connecting to, if this URL starts with file So it's actually referencing a file, not like an HTTP web page, well, dotnet has different classes that it uses for to deal with these requests, and they may be cast into one each other, which then results in the user actually writing files on the server instead of well just requesting or posting some data from an HTTP API, which is interesting. And in some cases that watchtower shows here, like the like for example, they have a proof of concept exploit for this vulnerability in Barracuda system. Well, it is exploitable. The tricky part here is it really depends on how a developer implemented these particular API's. Microsoft is not thinking about fixing this problem. They're saying it's really more a problem in how users are using their tools. So not so much a problem with how these tools are working. watchTowr here is disagreeing with this a little bit, but still, you know, as a internet developer, you definitely should be aware of this and should take a look at what watchtower is demonstrating. And then we got a report from CISA summarizing some recent activity by pro-Russian hacktivists. Now, hacktivists, of course, are not necessarily state-sponsored actors, but more individuals who do it out of, well, the good or bad of their own heart. What I sort of thought is interesting about this report is it's labeled as being about global critical infrastructure. And when we're talking global critical infrastructure, we are thinking about, you know, power systems and things like this. That's part of the report, but it also covers attacks against some smaller businesses, basically factories and such that may not necessarily see themselves as sort of operating big OT networks and being part of critical infrastructure, but have many of the same vulnerabilities, maybe more so because of the less mature IT and security organization that you often find in these smaller companies. So definitely worthwhile looking at this particular if you are working for any kind of manufacturing company that, for example, does have sensors and the like that are remotely accessible and could potentially affect your production line, for example. Well, and this is it for today. So thanks for listening. Thanks for liking, subscribing. And I saw a couple of you did leave comments in Apple's podcast app. So thanks a lot for that and talk to you again on Monday. Bye.





