Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsSANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues
Cybersecurity

SANS Internet StormCast

SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues

SANS Internet StormCast
•December 22, 2025•6 min
0
SANS Internet StormCast•Dec 22, 2025

Key Takeaways

  • •TLS stands for Threat Local Storage, bypasses static analysis
  • •FreeBSD IPv6 router advertisements enable remote code execution
  • •OpenSense and PFsense patches mitigate critical FreeBSD vulnerability
  • •NIST time servers vulnerable after power loss; use NTP pool
  • •Switches with router advertisement guard can block exploit

Pulse Analysis

The episode opens with a deep dive into TLS, not the familiar Transport Layer Security, but Threat Local Storage. This mechanism lets attackers inject environment variables into executables and DLLs, triggering code before the main entry point runs. Because the payload resides in what appears to be benign configuration data, traditional static analysis often misses it. Security researchers and reverse engineers are urged to expand their tooling to inspect TLS callbacks, especially when dissecting Windows malware that leverages DLL entry points.

A critical vulnerability in FreeBSD is highlighted, where IPv6 router advertisements are processed even on systems without IPv6 enabled. Maliciously crafted domain strings in the DNS search list are passed to shell scripts without validation, granting arbitrary code execution to any network‑adjacent attacker. The flaw directly impacts popular firewall distributions such as OPNsense and pfSense, both of which have released patches or configuration work‑arounds. Administrators are advised to apply updates promptly and consider enabling router‑advertisement guard on managed switches to restrict unsolicited advertisements to trusted routers only.

The final segment covers the unexpected outage at NIST’s Boulder time‑server facility caused by prolonged generator use during high‑wind events. While redundancy across Colorado and Maryland sites prevents a total loss of service, the incident underscores the fragility of single‑point time sources. Practitioners should avoid relying exclusively on NIST servers and instead synchronize with a diversified pool of NTP servers, such as the public NTP pool project. This broader lesson reinforces the need for resilient infrastructure design across all critical internet services.

Episode Description

DLLs & TLS Callbacks

https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580

https://www.freebsd.org/security/advisories/FreeBSD-SA-25:12.rtsold.asc

https://tf.nist.gov/tf-cgi/servers.cgi https://groups.google.com/a/list.nist.gov/g/internet-time-service/c/o0dDDcr1a8I

Show Notes

0

Comments

Want to join the conversation?

Loading comments...