SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Friday, October 3rd, 2025: More .well-known Scans; RedHat Openshift Patch; TOTOLINK Vuln;

Oct 3, 2025
Attackers are exploiting .well-known directories to gather sensitive API documentation for reconnaissance. A critical vulnerability in Red Hat's OpenShift AI Service allows low-privileged users to escalate their access to cluster administrator. The podcast highlights serious flaws in the TOTOLINK X6000R routers, particularly a dangerous unauthenticated command injection. Lastly, a memory corruption flaw in DrayTek's Vigor series routers could let unauthorized users execute arbitrary code, making swift patching essential.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Public .well-known Files Aid Reconnaissance

  • Attackers are scanning the .well-known directory to harvest API and configuration metadata for reconnaissance.
  • Those files can leak sensitive details like API secrets if misconfigured, increasing attack surface.
ADVICE

Verify And Monitor .well-known Endpoints

  • Check .well-known endpoints regularly to confirm only intended data is published and no secrets are leaked.
  • Monitor those locations and remove or fix any responses that expose confidential keys or configuration.
ADVICE

Patch OpenShift AI Service And Restrict Notebooks

  • Patch Red Hat OpenShift AI Service promptly if you allow Jupyter notebook users, since a low-privileged user can escalate to cluster admin.
  • Treat access to Jupyter notebooks cautiously and apply least-privilege controls.
Get the Snipd Podcast app to discover more snips from this episode
Get the app