InfoSec.Watch Podcast — Episode 122: Cisco UC zero-days, Oracle patch overload, and the new Tier-Zero reality
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
概要
This week on the InfoSec.Watch Podcast, we break down a wave of high-impact security events underscoring a hard truth for defenders: management planes and dependencies are now primary intrusion paths.
The episode opens with active exploitation of a Cisco Unified Communications zero-day (CVE-2026-20045), an unauthenticated web-management RCE capable of delivering full root-level compromise across multiple UC platforms. With exploitation confirmed and CISA adding the flaw to its Known Exploited Vulnerabilities list, the hosts explain why UC management interfaces must be treated as Tier-Zero assets, and why assumed-breach reviews are mandatory even after patching.
Next, the discussion turns to Oracle’s January Critical Patch Update, delivering more than 300 fixes across its portfolio. Grant and Sloane walk through a practical prioritization strategy—patching by exposure, not product name—and explain how to use Oracle’s own exploitability flags and compensating controls to avoid patch paralysis.
The episode also covers Ingram Micro’s ransomware-related data exposure, highlighting the growing risk of third-party concentration. The hosts outline what every organization should have ready before a supplier breach occurs, from notification SLAs and data minimization to pre-staged third-party incident response playbooks.
In the Vulnerability Spotlight, the focus shifts to two expanding attack surfaces:
- Unauthenticated management UI exploitation as a recurring root-compromise pattern
- Malicious code embedded in developer dependencies, including a widely used package now listed in CISA’s KEV catalog
The Trend to Watch ties these threads together: attackers are moving up the stack, blending classic perimeter weaknesses with modern software supply-chain abuse. Management planes, CI/CD pipelines, and automation platforms are increasingly being scanned, scripted, and poisoned at scale.
The episode closes with a decisive Actionable Defense Move of the Week—formally defining your Tier-Zero systems and enforcing strict controls around access, exposure, monitoring, and containment—followed by a clear final warning: if a management interface is reachable from the internet, attackers will automate it.
For deeper coverage and weekly briefings delivered straight to your inbox, subscribe at infosec.watch and follow InfoSec.Watch on X, Facebook, and LinkedIn.
Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!