SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, January 27th, 2026: PWD scanning; MSFT Office OOB Patch; Exposed Clawdbot

10 snips
Jan 27, 2026
Scanners are appending pwd output to web URLs to hunt for exposed OS paths and config files. A new out-of-band Microsoft Office patch fixes an actively exploited COM/OLE bypass. Many CloudBot instances are left exposed without access control, risking full remote takeover. Brief notes on Apple updates and recommended mitigations round out the discussion.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

* pwd In Web Scans Reveals Path-Guessing Trend*

  • Attackers are appending the literal output of pwd to web scan URLs to try to reveal filesystem paths mapped to web roots.
  • This technique may succeed against certain misconfigurations or reveal data leakage in exposed files.
ADVICE

Apply Microsoft Office OOB Patch Now

  • Install Microsoft's out-of-band Office patch or run the provided fix-it script to block unsafe COM control execution.
  • For older Office versions apply the specified registry change manually to mitigate active exploitation of CVE-2026-21509.
ADVICE

Lock Down CloudBot Instances

  • Do not expose CloudBot instances to the Internet without access controls; add passwords or stop publishing proxies.
  • Prefer connecting via VPN and restrict CloudBot to loopback to avoid giving attackers full system access.
Get the Snipd Podcast app to discover more snips from this episode
Get the app