

SANS Stormcast: File Hashes in MSFT BI; Apache Camel Vuln; Juniper Fixes Exploited Vuln; AMI Patches 10.0 Redfish BMC Vuln
Mar 14, 2025
Discover how to analyze file hashes using Microsoft's BI tool, unlocking insights from honeypot data. Dive into the recent Apache Camel vulnerability that allows for easy exploitation via query parameters, raising alarms about arbitrary code execution risks. Learn about Juniper's urgent patch for a previously exploited JunOS vulnerability that threatens complete device compromise. Finally, hear about AMI's security advisory addressing multiple vulnerabilities, including a critical authentication bypass in Redfish, rated with a troubling CVSS score of 10.0.
AI Snips
Chapters
Transcript
Episode notes
Honeypot Analysis with BI
- Analyze Cowrie honeypot file hashes with Microsoft BI.
- Discover new and interesting files uploaded to your honeypot.
Apache Camel Vulnerability
- Apache Camel, an integration framework, had a simple vulnerability.
- Exploiting it via headers or GET parameters allowed arbitrary code execution.
Patch Apache Camel
- Apply the latest Apache Camel patch.
- This fixes both header and parameter vulnerabilities.