{"id":2691,"date":"2020-06-15T08:00:00","date_gmt":"2020-06-15T06:00:00","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=2691"},"modified":"2023-08-16T15:04:57","modified_gmt":"2023-08-16T13:04:57","slug":"smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/","title":{"rendered":"SMBleed vulnerability allows an attacker to leak kernel memory"},"content":{"rendered":"\n<p>Welcome to the next episode of the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\">Xopero Security Center<\/a>!&nbsp;There is a new SMB protocol vulnerability called SMBleed and tracked as CVE-2020-1206 which allows an attacker to leak kernel memory remotely, without any authentication. How can it be exploited? Check below.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<!--more-->\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"smbleed-a-new-critical-vulnerability-affects-windows-smb-protocol\">SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol<\/h2>\n\n\n<p>Researchers uncovered a new critical vulnerability affecting the Server Message Block (SMB) protocol. It could allow attackers to leak kernel memory remotely, and when combined with a previously disclosed &#8222;wormable&#8221; bug, the flaw can be exploited to achieve remote code execution attacks.<\/p>\n\n\n\n<p>Dubbed &#8222;SMBleed&#8221; (CVE-2020-1206), the flaw resides in SMB&#8217;s decompression function &#8211; the same function as with SMBGhost or EternalDarkness bug. And just to remind you &#8211; SMBGhost was deemed so serious that it received a maximum severity rating score of 10.<\/p>\n\n\n\n<p>The SMBleed vulnerability impacts Windows 10 versions 1903 and 1909, for which Microsoft last week released security patches.&nbsp;<\/p>\n\n\n\n<p>The SMBleed flaw stems from the way the decompression function in question (&#8222;Srv2DecompressData&#8221;) handles specially crafted message requests (e.g., SMB2 WRITE) sent to a targeted SMBv3 Server, allowing an attacker to read uninitialized kernel memory and make modifications to the compression function.<\/p>\n\n\n\n<p>&#8222;An attacker who successfully exploited the vulnerability could obtain information to further compromise the user&#8217;s system. To exploit the vulnerability against a client, an unauthenticated attacker would need to configure a malicious SMBv3 server and convince a user to connect to it\u201d &#8211; said Microsoft in its advisory.<\/p>\n\n\n\n<p>Worse, SMBleed can be chained with SMBGhost on unpatched Windows 10 systems to achieve remote code execution.<\/p>\n\n\n\n<p>To mitigate the vulnerability, it&#8217;s recommended that home and business users install the latest Windows updates as soon as possible. For systems where the patch is not applicable, it&#8217;s advised to block port 445 to prevent lateral movement and remote exploitation.<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2020\/06\/SMBleed-smb-vulnerability.html\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/xopero.com\/products\/xopero-backup-restore\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en.jpg\" alt=\"\" class=\"wp-image-2705\" width=\"400\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en.jpg 580w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-en-300x207.jpg 300w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"plugandplay-protocol-vulnerability-is-a-serious-threat-for-even-a-few-billions-of-devices\"><strong>Plug-and-Play Protocol vulnerability is a serious threat for even a few billions of devices<\/strong><\/h2>\n\n\n<p>The flaw was named &#8222;CallStranger\u201d (CVE-2020-12695) &#8211; a very accurate name, it is based on a security vulnerability in a protocol that allows the devices to communicate with each other. A wide range of plug-and-play products is impacted, including Xbox gaming consoles, printers, routers, switches, and cameras &#8211; devices from over 20 vendors, including Microsoft, Cisco, Canon, HP, and Philips are vulnerable. The full list of affected devices can be found <a rel=\"noreferrer noopener\" href=\"https:\/\/callstranger.com\/index.html#vulnerabledevices\" target=\"_blank\">here.<\/a><\/p>\n\n\n\n<p>Attackers can not only launch DDoS attacks but also scan internal ports for other similarly vulnerable devices on local networks.<\/p>\n\n\n\n<p>The flaw discovered by Yunus \u00c7ad\u0131rc\u0131, a Cyber Security Senior Manager at EY Turkey, is associated with an UPnP function called SUBSCRIBE that allows devices to monitor the status of other network-connected UPnP services and devices. The problem with UPnP is that devices running the protocol implicitly trust requests from other devices on the local network without any prior authentication.<\/p>\n\n\n<h6 class=\"wp-block-heading\" id=\"anatomy-of-an-attack\">Anatomy of an attack<\/h6>\n\n\n<p>Attackers can take control of the function via specifically crafted SUBSCRIBE requests over HTTP &#8211; the 'Callback&#8217; header value in the UPnP SUBSCRIBE function is not checked. Hackers could stuff their request with a large volume of target URLs across multiple vulnerable devices, overwhelming their target&#8217;s resources which results in a denial of service.<\/p>\n\n\n\n<p>Attackers could also steal data with UPnP. Connected media devices often reveal unique identifiers. Printers may allow monitoring of print status, and routers may give detailed information about the names and addresses of devices on the network. The severity of this threat depends on the device.&nbsp;<\/p>\n\n\n\n<p>Open Connectivity Foundation (OCF) updated the UPnP protocol specification on April 17 and has notified vendors and ISPs about the need to upgrade to the new specification. However, because the flaw lies at the protocol level, it could take a long time before all vendors address the issue.<\/p>\n\n\n\n<p>Read more: <a href=\"https:\/\/callstranger.com\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">CallStranger.com<\/a> | <a href=\"https:\/\/kb.cert.org\/vuls\/id\/339275\" target=\"_blank\" rel=\"noreferrer noopener\">CERT Coordination Center<\/a> | <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/vulnerability-in-plug-and-play-protocol-puts-billions-of-devices-at-risk\/d\/d-id\/1338032\" target=\"_blank\" rel=\"noreferrer noopener\">Dark Reading<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"google-is-indexing-the-phone-numbers-of-whatsapp-users-raising-privacy-concerns\"><strong>Google is indexing the phone numbers of WhatsApp users raising privacy concerns<\/strong><\/h2>\n\n\n<p>Google is indexing the phone numbers of WhatsApp users that could be abused by threat actors for malicious activities.&nbsp;<\/p>\n\n\n\n<p>Earlier this year, the Deutsche Welle journalist Jordan Wildon, noticed that invite links for WhatsApp and Telegram groups that may be intended for private access were available through search engines. These links could be abused by threat actors to join the group.<\/p>\n\n\n\n<p>Now security researcher Athul Jayaram discovered a data leak with WhatsApp\u2019s \u2018wa.me\u2019 domain that was revealing contact phone numbers on Google. The \u2018wa.me\u2019 domain is used to host \u2018click to chat\u2018 links that allow users to start a chat with someone without having their phone number saved in the phone\u2019s address book.<\/p>\n\n\n\n<p>To create the click to chat links, use https:\/\/wa.me\/&lt;number&gt; which is a full phone number in international format. The \u201cwa.me\u201d or \u201capi.whatsapp.com\u201d domains don\u2019t\u2019 prevent search engines from crawling phone numbers on the website allowing any link like \u201chttps:\/\/wa.me\/\u201d to get indexed by Google.<\/p>\n\n\n\n<p>Even if Google Search only revealed the phone numbers and not the identities of associated users, ill-intentioned attackers could be able to see users\u2019 profile pictures on WhatsApp and performing a reverse-image search the user\u2019s profile picture to gather additional info on the potential victim (i.e. mining social media accounts where the victim use the same profile picture). It might allow attackers to message and call them, sell their numbers to marketers, spammers and scammers.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/securityaffairs.co\/wordpress\/104445\/digital-id\/google-indexed-whatsapp-numbers.html\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"crosstalk-a-younger-brother-of-spectre-and-meltdown\"><strong>CrossTalk a younger <em>brother<\/em> of Spectre and Meltdown<\/strong><\/h2>\n\n\n<p>The newly discovered vulnerability can be used to leak data across Intel CPU cores. This is an example of another type of MDS (microarchitectural data sampling) attack. It enables attacker-controlled code executing on one CPU core to leak sensitive data from other software running on a different core. During the attack hacker targets user data while in a &#8222;transient&#8221; state, as it&#8217;s being processed by the CPU&#8217;s Line Fill Buffer (LBF).<\/p>\n\n\n\n<p>Researchers from the Vrije University&#8217;s Systems and Network Security Group (Netherlands) have been working with Intel to develop a patch since September 2018. You probably ask yourself why it took almost 21 months\u2026 For the most part, this is because of the complexity of the issue. In the meantime, Intel has already made significant changes to the hardware design of its CPUs. Most of its recent products are not vulnerable to this attack. OK, and what with the older Intel CPU lines? Intel has released a microcode update (Intel-SA-00320) to patch the bug a few days ago. You can find detailed information <a href=\"https:\/\/blogs.intel.com\/technology\/2020\/06\/ipas-security-advisories-for-june-2020\/?li\">here<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"CrossTalk (SRBDS) leaking SGX key across CPU cores in 1 second\" width=\"1200\" height=\"900\" src=\"https:\/\/www.youtube.com\/embed\/7tba2ayE3cI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/new-crosstalk-attack-impacts-intels-mobile-desktop-and-server-cpus\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Windows 10 security alert &#8211; users warned over 'wormable&#8217; bug (<a href=\"https:\/\/www.techradar.com\/news\/windows-10-security-alert-users-warned-over-wormable-bug\" target=\"_blank\" rel=\"noreferrer noopener\">TechRadar<\/a>)<br>2. KingMiner botnet brute-forces MSSQL databases to install cryptocurrency miner (<a href=\"http:\/\/zdnet.com\/article\/kingminer-botnet-brute-forces-mssql-databases-to-install-cryptocurrency-miner\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>3. Valak malware gets new plugin to steal Outlook login credentials (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/valak-malware-gets-new-plugin-to-steal-outlook-login-credentials\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer<\/a>)<br>4. PoC RCE exploit for SMBGhost Windows flaw released (<a href=\"https:\/\/www.helpnetsecurity.com\/2020\/06\/08\/smbghost-poc-rce-exploit\/\" target=\"_blank\" rel=\"noreferrer noopener\">HelpNetSecurity<\/a>)<br>5. Stealthworker botnet targets Windows and Linux servers (<a href=\"https:\/\/securityaffairs.co\/wordpress\/104427\/malware\/stealthworker-botnet.html\" target=\"_blank\" rel=\"noreferrer noopener\">InfoSecurity<\/a>)<br>6. Kubernetes Falls to Cryptomining via Machine-Learning Framework (<a href=\"https:\/\/threatpost.com\/kubernetes-cryptomining-machine-learning-framework\/156481\/\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatPost<\/a>)<br>7. Gamaredon group grows its game (<a href=\"https:\/\/www.welivesecurity.com\/2020\/06\/11\/gamaredon-group-grows-its-game\/\" target=\"_blank\" rel=\"noreferrer noopener\">We Live Security<\/a>)<br>8. A Bug in Facebook Messenger for Windows Could&#8217;ve Helped Malware Gain Persistence (<a href=\"https:\/\/thehackernews.com\/2020\/06\/facebook-malware-persistence.html\" target=\"_blank\" rel=\"noreferrer noopener\">The Hacker News<\/a><br>9. Phishers Hide #COVID19 Malware in CVs and Medical Leave Forms (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/phishers-hide-covid19-malware-cvs\/\" target=\"_blank\" rel=\"noreferrer noopener\">InfoSecurity<\/a>))<br>10. Fake SpaceX YouTube channels scam viewers out of $150K in bitcoin (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-spacex-youtube-channels-scam-viewers-out-of-150k-in-bitcoin\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the next episode of the&nbsp;Xopero Security Center!&nbsp;There is a new SMB protocol vulnerability called SMBleed and tracked as CVE-2020-1206 which allows an attacker to leak kernel memory remotely, without any authentication. How can it be exploited? Check below.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-2691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SMBleed vulnerability allows an attacker to leak kernel memory - Xopero Blog<\/title>\n<meta name=\"description\" content=\"There is a new SMB protocol vulnerability called SMBleed and tracked as CVE-2020-1206 which allows an attacker to leak kernel memory remotely, without...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SMBleed vulnerability allows an attacker to leak kernel memory - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"There is a new SMB protocol vulnerability called SMBleed and tracked as CVE-2020-1206 which allows an attacker to leak kernel memory remotely, without...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-15T06:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T13:04:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"SMBleed vulnerability allows an attacker to leak kernel memory\",\"datePublished\":\"2020-06-15T06:00:00+00:00\",\"dateModified\":\"2023-08-16T13:04:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/\"},\"wordCount\":1208,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/\",\"name\":\"SMBleed vulnerability allows an attacker to leak kernel memory - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-06-15T06:00:00+00:00\",\"dateModified\":\"2023-08-16T13:04:57+00:00\",\"description\":\"There is a new SMB protocol vulnerability called SMBleed and tracked as CVE-2020-1206 which allows an attacker to leak kernel memory remotely, without...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SMBleed vulnerability allows an attacker to leak kernel memory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SMBleed vulnerability allows an attacker to leak kernel memory - Xopero Blog","description":"There is a new SMB protocol vulnerability called SMBleed and tracked as CVE-2020-1206 which allows an attacker to leak kernel memory remotely, without...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/","og_locale":"pl_PL","og_type":"article","og_title":"SMBleed vulnerability allows an attacker to leak kernel memory - Xopero Blog","og_description":"There is a new SMB protocol vulnerability called SMBleed and tracked as CVE-2020-1206 which allows an attacker to leak kernel memory remotely, without...","og_url":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-06-15T06:00:00+00:00","article_modified_time":"2023-08-16T13:04:57+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"SMBleed vulnerability allows an attacker to leak kernel memory","datePublished":"2020-06-15T06:00:00+00:00","dateModified":"2023-08-16T13:04:57+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/"},"wordCount":1208,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/","url":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/","name":"SMBleed vulnerability allows an attacker to leak kernel memory - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-06-15T06:00:00+00:00","dateModified":"2023-08-16T13:04:57+00:00","description":"There is a new SMB protocol vulnerability called SMBleed and tracked as CVE-2020-1206 which allows an attacker to leak kernel memory remotely, without...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/smbleed-vulnerability-allows-an-attacker-to-leak-kernel-memory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"SMBleed vulnerability allows an attacker to leak kernel memory"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=2691"}],"version-history":[{"count":11,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2691\/revisions"}],"predecessor-version":[{"id":5039,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2691\/revisions\/5039"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=2691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=2691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=2691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}