
SANS Internet StormCast
SANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix
AI Summary
The episode reviews Microsoft’s January Patch Tuesday (113 fixes, including one actively exploited and eight critical bugs), Adobe’s updates for ColdFusion and Acrobat Reader, and two Fortinet advisories covering an unauthenticated heap overflow and an SSRF issue. It also highlights a new OAuth‑based “ConsentFix” attack that tricks users into copying a consent URL to harvest tokens, bypassing redirect‑URI mitigations. Host Johannes Ullrich emphasizes the urgency of applying these patches, especially the ColdFusion file‑upload and FortiOS buffer overflow flaws, and warns organizations to educate users against social‑engineering token theft.
Episode Description
Microsoft Patch Tuesday January 2026
https://isc.sans.edu/diary/January%202026%20Microsoft%20Patch%20Tuesday%20Summary/32624
https://helpx.adobe.com/security.html
https://fortiguard.fortinet.com/psirt/FG-IR-25-783
https://fortiguard.fortinet.com/psirt/FG-IR-25-084
https://pushsecurity.com/blog/consentfix
Show Notes
SANS Stormcast – Wednesday, January 14 2026
Handler on Duty: Johannes Ullrich
Microsoft Patch Tuesday – January 2026
Microsoft released patches for 113 vulnerabilities. The update includes:
-
1 already‑exploited vulnerability
-
1 vulnerability disclosed today
-
8 critical vulnerabilities
A summary of the Microsoft Patch Tuesday can be found in the SANS diary entry “January 2026 Microsoft Patch Tuesday Summary”.
Adobe Patches
Adobe released patches for five products. Of particular note are code‑execution vulnerabilities in:
-
ColdFusion – an arbitrary file‑upload issue that could be used to place a web‑shell.
-
Acrobat Reader – two critical vulnerabilities that allow code execution.
More details are available on Adobe’s security advisory page.
Fortinet Patches
Fortinet issued two advisories:
-
FG‑IR‑25‑783 – A heap‑based buffer overflow affecting FortiOS and FortiSwitch Manager. It allows unauthenticated code execution. A workaround is to block access via the fabric interfaces.
-
FG‑IR‑25‑084 – A server‑side request forgery (SSRF) in the FortiSandbox GUI that could be used to reach limited internal endpoints.
ConsentFix – A New OAuth‑Based ClickFix‑Style Attack
PushSecurity’s blog post describes the “ConsentFix” attack, which builds on the classic ClickFix technique.
-
Attackers present a fake CAPTCHA‑style dialog that instructs victims to copy‑paste an OAuth URL (including credentials) into the dialog.
-
The victim is asked to log in to Microsoft and grant permissions to a legitimate application.
-
Instead of the attacker running the application, they simply capture the OAuth consent URL that contains the access token/credentials.
-
This bypasses recent mitigations that limit redirect‑URI manipulation, by extracting the token directly from the URL bar after the user authorizes the request.
The technique demonstrates how attackers can still harvest OAuth tokens even when redirect‑URI protections are in place.
Podcast Transcript
Hello and welcome to the Wednesday, January 14th, 2026 edition of the
SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich and
today I'm recording from Jacksonville, Florida. And this episode is
brought to you by the SANS.edu Graduate Certificate Program in
Cybersecurity Leadership.
Well of course the topic today is Microsoft's Patch Tuesday. We got our
first Patch Tuesday for 2026 and it was sort of well I would sort of
say a little bit average Patch Tuesday. Nothing really all that terribly
exciting. We got a total of 113 vulnerabilities addressed which
includes one vulnerability in Microsoft Edge which really is a
Chromium vulnerability ported over to Microsoft's Edge browser. Then
there were eight critical vulnerabilities in this set and one
vulnerability is already being exploited and the second one that has
been disclosed. Let's actually start with the disclosed vulnerability
because that's a relatively straightforward one. The problem here is
that the certificates being used for secure boot need to be rotated
as so often with cryptographic keys. They expire after a while these
certificates. So that's really what this is about. If that doesn't
happen then of course you end up with expired certificates which then
could be used by an attacker to essentially bypass secure boot. But
yes this new update now basically just loads the latest certificates
into the operating system which then should basically protect secure
boot again and prevent this expiration from happening.
The second issue and that's the one that's already being exploited is a
little bit tricky. It's a problem with the MLPC port. It's sort of an
RPC mechanism in Windows and this particular vulnerability is really
more information disclosure vulnerability that would allow an attacker
to essentially access some of the communication here on this port. And
yes that could then be leveraged to additional more severe exploits
probably. But by itself this vulnerability isn't really all that
critical. Actually it's just rated as important by Microsoft.
Among the critical vulnerabilities we had a number of vulnerabilities
that were Microsoft Office, Word, Excel vulnerabilities. There was one
vulnerability that was a little bit interesting at least from the
title. And that's a remote code execution vulnerability in LSASS. We
had some real high‑impact vulnerabilities in LSASS before like the
famous Blaster Worm. This is nothing like that. This particular
vulnerability in order to exploit it does require an authentication.
Also as Microsoft states in its advisory the attacker first needs to
prepare the system properly. Whatever that means. Probably sort of now
filling up some memory.
Adobe also released this update as usual. This time fixing five
different products. Among those products there are two that I always
pay attention to. Adobe ColdFusion. There is an arbitrary file upload
vulnerability that's being addressed here. So this could be abused to
upload something like a webshell. The second product here is Acrobat
Reader. Two critical vulnerabilities that would allow code execution.
So definitely update both of these particular. I would say here
ColdFusion is one that you really need to pay attention to. We had
similar vulnerabilities before. So wouldn't be surprised to see an
exploit for this relatively shortly.
And then we got two different updates from Fortinet. The first one
affects FortiOS and FortiSwitch Manager. It's a heap‑based buffer
overflow vulnerability. So with that allows for code execution and does
not require any authentication. There is a workaround listed here
where you essentially just don't allow access via the fabric
interfaces in your FortiOS and FortiSwitch Manager. Probably something
to consider anyway regardless on whether or not you're going to apply
the patch here for this vulnerability. But yes, certainly something
that you do want to address even though it only affects some
configurations of these devices.
The second vulnerability is in the Forti sandbox. So here if you're
using the GUI to basically inspect your sandbox results, there's a
possibility for malicious software to actually use a server‑side request
forgery. Now what can be done with this vulnerability is a little bit
limited like what endpoints can be accessed. But still, you know,
something to be aware of in particular since you're using this sandbox
to look at potentially malicious code.
In addition to all the new vulnerabilities, we also do have an
interesting new technique being used by attackers. PushSecurity has a
blog post about what they're calling the **consent fix attack**. Now
you're all familiar with the click fix attack. That's the fake capture
where the attacker is then tricking the victim into copy‑pasting
commands into some kind of run dialogue on their system. This actually
is going after OAuth secrets. So the way this attack works is that
again, the attacker is displaying a fake capture to the user, but then
instructs the user to log in in this example to Microsoft and give
Microsoft permissions for particular application.
Now, the typical trick here is then that after the user gives that
permission or assigns that permission to the application in Microsoft's
authentication interface, the victim is being redirected back to the
application that then receives the credentials to authenticate to
Microsoft's API. In this case, the attacker is not running that
application. It's a legitimate application that the attacker would like
to have access to. So the attacker is then basically asking the victim
to copy‑paste the URL, which includes the credentials, into the capture
dialog in order to capture these credentials. Interesting play here
on OAuth.
In the past, sometimes you have seen similar attacks by manipulating
the redirect URI, which is the URI that the user is being redirected
to after authenticating. But the applications and also OAuth providers
have sort of clamped down on some of these issues. So this is now the
next thing. Well, if I can't redirect the user to my URI, then let me
just grab it from their URL bar and let me have the user help with that.
So, amazing that some of this actually works, given that some of these
copy‑paste things aren't quite that terribly straightforward. But
apparently the attackers can make it work.
Well, that's it for today. Thanks for listening, thanks for liking,
and thanks for subscribing to this podcast. Remember, I'll be teaching
in Orlando and Amsterdam in April. So if you're interested, at the
bottom of the show notes on the InternetStorms website you'll see links
to currently offered classes. That's it!
End of article.
Comments
Want to join the conversation?
Loading comments...