Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsSANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby Patches.
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby Patches.
Cybersecurity

SANS Internet StormCast

SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby Patches.

SANS Internet StormCast
•December 10, 2025•8 min
0
SANS Internet StormCast•Dec 10, 2025

Key Takeaways

  • •Microsoft's Patch Tuesday: 57 fixes, one exploited privilege escalation.
  • •PowerShell Invoke-WebRequest now warns about potential code execution.
  • •Adobe Fusion patch fixes unconstrained file upload remote code execution.
  • •Ivanti Endpoint Manager XSS flaw scores 9.6, threatens admin sessions.
  • •Fortinet SSO authentication bypass affects all 40 cloud deployments.

Pulse Analysis

The December 10, 2025 Stormcast opened with a concise review of Microsoft’s Patch Tuesday. Out of 57 disclosed vulnerabilities, only three earned a critical rating, and the most urgent issue was a privilege‑escalation flaw in the Cloud Files Mini‑filter driver that is already being weaponized. Microsoft also refined the Invoke‑WebRequest PowerShell cmdlet, adding a warning to curb inadvertent code execution, and tightened constraints on the GitHub Copilot plug‑in for JetBrains IDEs, reflecting growing concerns around AI‑driven code injection.

Adobe’s update slate was lighter than usual, covering five products but spotlighting two high‑risk fixes. Fusion suffered an unconstrained file‑upload vulnerability that could enable remote code execution via a malicious web shell, while Acrobat Reader addressed classic PDF‑based code‑execution exploits. Ivanti (formerly Avanti) released a critical patch for Endpoint Manager, fixing a stored cross‑site scripting flaw in admin sessions that earned a CVSS 9.6 score, potentially allowing attackers to hijack privileged browsers. Fortinet warned of an authentication‑bypass bug affecting all devices using its 40 cloud single‑sign‑on service, urging administrators to disable the feature until patched. A final note covered a Ruby SAML library parser discrepancy, closing a lingering XML parsing issue.

For enterprise security teams, these updates underscore the importance of rapid patch management and layered defenses. While Microsoft’s overall patch load was modest, the presence of an actively exploited driver bug demands immediate remediation. Adobe and Ivanti’s high‑severity flaws illustrate that even routine product lines can harbor critical weaknesses, especially in file‑handling and admin interfaces. Organizations should prioritize disabling vulnerable SSO pathways, enforce strict code‑execution policies in PowerShell scripts, and validate third‑party libraries such as Ruby SAML parsers. Proactive monitoring, timely patch deployment, and continuous threat‑intel integration remain essential to mitigate the evolving exploit landscape.

Episode Description

Microsoft Patch Tuesday

https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550

https://helpx.adobe.com/security.html

https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US

https://fortiguard.fortinet.com/psirt/FG-IR-25-647

https://github.com/SAML-Toolkits/ruby-saml/security/advisories/GHSA-9v8j-x534-2fx3

Show Notes

0

Comments

Want to join the conversation?

Loading comments...