Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsSANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix
SANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix
Cybersecurity

SANS Internet StormCast

SANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix

SANS Internet StormCast
•January 14, 2026•7 min
0
SANS Internet StormCast•Jan 14, 2026

Key Takeaways

  • •Microsoft Patch Tuesday addresses 113 vulnerabilities, eight critical.
  • •Secure boot certificate rotation patch prevents exploitation of expired keys.
  • •Exploited LPC port info disclosure rated important, not critical.
  • •Adobe ColdFusion arbitrary file upload and Acrobat code execution fixes.
  • •FortiOS buffer overflow allows unauthenticated code execution; patch recommended.

Pulse Analysis

Microsoft’s January Patch Tuesday delivered 113 fixes, including eight classified as critical. The most visible change is a secure‑boot certificate rotation that replaces expired keys, closing a path attackers could use to bypass firmware integrity checks. An already‑exploited LPC port vulnerability provides information disclosure, rated important rather than critical, but still warrants prompt remediation. Additional patches address long‑standing Office Word/Excel flaws and a new ElSass remote‑code‑execution issue that requires prior authentication, underscoring the need for rapid deployment across Windows environments.

Adobe’s update tackles five products, with ColdFusion’s arbitrary file‑upload flaw and two critical Acrobat Reader code‑execution bugs standing out. Both vulnerabilities can lead to web‑shell deployment or full system compromise if left unpatched, making them high priority for web‑application teams. Fortinet released two separate advisories: a heap‑based buffer overflow in FortiOS/FortiSwitchManager that enables unauthenticated code execution, and a sandbox GUI SSRF that could leak internal endpoints. The vendor‑provided work‑around—blocking fabric‑interface access—helps mitigate risk while administrators apply the patches, highlighting the importance of layered defense.

The episode also warns about a new “consent‑fix” attack that extends the classic click‑jacking trick to OAuth flows. Attackers present a fake CAPTCHA, then coax victims into granting permissions to a legitimate application while secretly capturing the redirected URL that contains OAuth tokens. By copying the URL into a command prompt, the thief harvests credentials without needing a malicious redirect endpoint. This evolution demonstrates how social engineering can bypass modern anti‑phishing controls, reinforcing the need for user education and strict OAuth redirect validation. Ulrich reminds listeners of upcoming SANS cybersecurity leadership classes in Orlando and Amsterdam for deeper training.

Episode Description

Microsoft Patch Tuesday January 2026

https://isc.sans.edu/diary/January%202026%20Microsoft%20Patch%20Tuesday%20Summary/32624

https://helpx.adobe.com/security.html

https://fortiguard.fortinet.com/psirt/FG-IR-25-783

https://fortiguard.fortinet.com/psirt/FG-IR-25-084

https://pushsecurity.com/blog/consentfix

Show Notes

0

Comments

Want to join the conversation?

Loading comments...