Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsSANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML Woes; MSMQ Issues After Patch;
SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML Woes; MSMQ Issues After Patch;
Cybersecurity

SANS Internet StormCast

SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML Woes; MSMQ Issues After Patch;

SANS Internet StormCast
•December 16, 2025•5 min
0
SANS Internet StormCast•Dec 16, 2025

Key Takeaways

  • •React2Shell exploit shows no new techniques, just typical malware.
  • •Iranian actors scanning for React2Shell, indicating older exploit usage.
  • •Ruby SAML library suffers XML parser mismatch, enabling forged assertions.
  • •Signed error messages can be repurposed for SAML impersonation attacks.
  • •Windows 2025 update breaks MSMQ, causing false memory errors.

Pulse Analysis

The latest Stormcast episode highlights the continued chatter around the React2Shell exploit. Honeypot logs show a single, widely‑distributed payload that downloads a file, marks it executable, and then stalls before launch—suggesting a missing component rather than a novel technique. Iranian threat actors were observed scanning for vulnerable hosts, a sign that the exploit is now mature and largely weaponized rather than emerging. For defenders, the takeaway is clear: focus on detecting the characteristic file‑drop behavior and ensure endpoint controls block execution from temporary directories.

The episode also revisits the Ruby SAML vulnerability that resurfaced after an incomplete patch. The root cause lies in the library’s use of two divergent XML parsers, which can interpret the same document differently and allow crafted assertions to slip through verification. A particularly clever twist involves harvesting digitally signed error messages from the SAML server and reusing the server’s signing key to forge user assertions. Organizations deploying SAML should validate inputs before handing them to the library, enforce strict schema checks, and consider alternative implementations that avoid mixed‑parser architectures.

Finally, Microsoft’s December 2025 cumulative update introduced a regression in Message Queuing (MSMQ). Servers running Windows Server 2016, 2019, and Windows 10 clients begin reporting “insufficient memory” or “insufficient disk space” errors despite ample resources, leading to queue failures. No official workaround has been released beyond rolling back the update, leaving enterprises in a precarious position. Administrators are advised to monitor MSMQ health metrics, isolate affected services, and prepare for a hotfix by testing the rollback in a controlled environment while awaiting Microsoft’s remediation.

Episode Description

More React2Shell Exploits CVE-2025-55182

https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572

https://portswigger.net/research/the-fragile-lock

https://learn.microsoft.com/en-us/windows/release-health/status-windows-10-22h2#message-queuing--msmq--might-fail-with-the-december-2025-windows-security-update

Show Notes

0

Comments

Want to join the conversation?

Loading comments...