{"id":2697,"date":"2020-06-15T08:00:00","date_gmt":"2020-06-15T06:00:00","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=2697"},"modified":"2023-08-16T13:18:52","modified_gmt":"2023-08-16T11:18:52","slug":"smbleed-plug-and-play-podatne-na-atak-crosstalk","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/","title":{"rendered":"SMBleed \/ Plug-and-Play podatne na atak \/ CrossTalk"},"content":{"rendered":"\n<p>Witamy w kolejnym zestawieniu <a href=\"https:\/\/xopero.com\/blog\/pl\/category\/centrum-bezpieczenstwa\/\" target=\"_blank\" rel=\"noreferrer noopener\">Centrum Bezpiecze\u0144stwa Xopero<\/a>! Protok\u00f3\u0142 SMB ma now\u0105 luk\u0119. SMBleed (CVE-2020-1206) umo\u017cliwia atakuj\u0105cemu doprowadzenie do wycieku pami\u0119ci j\u0105dra, bez konieczno\u015bci przeprowadzenia wcze\u015bniej jakiegokolwiek uwierzytelnienia. Wi\u0119cej dowiecie si\u0119 poni\u017cej.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-smbleed-nowa-krytyczna-luka-w-protokole-smb-systemu-windows\">1. <strong>SMBleed &#8211; nowa krytyczna luka w protokole SMB systemu Windows<\/strong><\/h2>\n\n\n<p>Badacze odkryli now\u0105 krytyczn\u0105 luk\u0119 wp\u0142ywaj\u0105c\u0105 na protok\u00f3\u0142 Server Message Block (SMB). Mo\u017ce to pozwoli\u0107 atakuj\u0105cym na dost\u0119p do pami\u0119ci j\u0105dra, a w po\u0142\u0105czeniu z wcze\u015bniej ujawnionym b\u0142\u0119dem &#8211; zdalne wykonanie kodu.<\/p>\n\n\n\n<p>B\u0142\u0105d, nazwany SMBleed (CVE-2020-1206), znajduje si\u0119 w funkcji dekompresyjnej SMB &#8211; podobnie jak w przypadku SMBGhost czy EternalDarkness. Dla przypomnienia &#8211; SMBGhost zosta\u0142 uznany za tak powa\u017cny, \u017ce otrzyma\u0142 maksymaln\u0105 ocen\u0119 10 punkt\u00f3w w skali SVS.&nbsp;<\/p>\n\n\n<h6 class=\"wp-block-heading\" id=\"smbleed-ktore-systemy-sa-podatne\">SMBleed &#8211; kt\u00f3re systemy s\u0105 podatne<\/h6>\n\n\n<p>Luka SMBleed dotyczy system\u00f3w Windows 10 w wersjach 1903 i 1909, dla kt\u00f3rych Microsoft wyda\u0142 \u0142atki w zesz\u0142ym tygodniu.<\/p>\n\n\n\n<p>Wada SMBleed wynika ze sposobu, w jaki funkcja dekompresyjna (\u201eSrv2DecompressData\u201d) obs\u0142uguje specjalnie spreparowane \u017c\u0105dania wiadomo\u015bci (np. SMB2 WRITE) wysy\u0142ane do serwera docelowego SMBv3. Umo\u017cliwia atakuj\u0105cemu odczyt niezainicjowanych danych pami\u0119ci j\u0105dra i modyfikacj\u0119 funkcji kompresji.&nbsp;<\/p>\n\n\n\n<p>\u201eOsoba atakuj\u0105ca, kt\u00f3rej uda si\u0119 wykorzysta\u0107 t\u0119 luk\u0119, mo\u017ce uzyska\u0107 informacje w celu dalszego naruszenia bezpiecze\u0144stwa systemu u\u017cytkownika. Aby wykorzysta\u0107 b\u0142\u0105d, nieuwierzytelniony atakuj\u0105cy musia\u0142by skonfigurowa\u0107 z\u0142o\u015bliwy serwer SMBv3 i przekona\u0107 u\u017cytkownika, aby si\u0119 z nim po\u0142\u0105czy\u0142\u201d &#8211; pisze Microsoft w swoim poradniku.<\/p>\n\n\n\n<p>Co gorsze, SMBleed mo\u017ce by\u0107 po\u0142\u0105czony z SMBGhost w niezaktualizowanych systemach Windows 10 i umo\u017cliwi\u0107 zdalne wykonanie kodu.<\/p>\n\n\n\n<p>Aby zminimalizowa\u0107 luk\u0119&nbsp; u\u017cytkownicy domowi i biznesowi powinni jak najszybciej zainstalowa\u0107 najnowsze aktualizacje Windowsa. W systemach, w kt\u00f3rych \u0142atka nie ma zastosowania, zaleca si\u0119 zablokowanie portu 445, aby zapobiec ruchowi bocznemu&nbsp; i zdalnej eksploatacji.<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2020\/06\/SMBleed-smb-vulnerability.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/xopero.com\/pl\/produkty\/xopero-backup-restore\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner.png\" alt=\"Backup danych dla firm - tylko Xopero Backup&amp;Restore. \" class=\"wp-image-2703\" width=\"400\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner.png 580w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/06\/xbr-baner-300x207.png 300w\" sizes=\"(max-width: 580px) 100vw, 580px\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-podatnosc-w-protokole-plugandplay-naraza-na-atak-nawet-kilka-miliardow-urzadzen\">2. <strong>Podatno\u015b\u0107 w protokole Plug-and-Play nara\u017ca na atak nawet kilka miliard\u00f3w urz\u0105dze\u0144<\/strong><\/h2>\n\n\n<p>Podatno\u015b\u0107 nazwano &#8222;CallStranger\u201d (CVE-2020-12695). Nazwa jest bardzo adekwatna, poniewa\u017c luka bezpiecze\u0144stwa dotyczy protoko\u0142u kt\u00f3ry umo\u017cliwia komunikacj\u0119 pomi\u0119dzy urz\u0105dzeniami. Nara\u017cona jest spora grupa produkt\u00f3w plug-and-play, w tym konsole Xbox, drukarki, routery, switche oraz kamery producent\u00f3w takich jak Microsoft, Cisco, Canon, HP, czy Philips. Pe\u0142n\u0105 list\u0119 podatnych urz\u0105dze\u0144 (oraz tych b\u0119d\u0105cych jeszcze na etapie weryfikacji) znajdziecie na <a href=\"https:\/\/callstranger.com\/index.html#vulnerabledevices\" target=\"_blank\" rel=\"noreferrer noopener\">tej stronie<\/a>.<\/p>\n\n\n\n<p>Atakuj\u0105cy dzi\u0119ki tej luce s\u0105 w stanie nie tylko przeprowadzi\u0107 atak DDoS, ale r\u00f3wnie\u017c skanowa\u0107 wewn\u0119trzne porty w poszukiwaniu kolejnych podatnych urz\u0105dze\u0144 w firmowej sieci.<\/p>\n\n\n\n<p>Podatno\u015b\u0107 wykryta przez Yunus \u00c7ad\u0131rc\u0131, Cyber Security Senior Manager\u2019a w EY Turkey, jest \u015bci\u015ble powi\u0105zana z funkcj\u0105 SUBSCRIBE w UpnP, kt\u00f3ra umo\u017cliwia monitorowanie status\u00f3w innych us\u0142ug oraz urz\u0105dze\u0144 podpi\u0119tych do sieci. Problem z UPnP polega g\u0142\u00f3wnie na tym, \u017ce urz\u0105dzenia z protoko\u0142em domy\u015blnie \u201eufaj\u0105\u201d \u017c\u0105daniom przesy\u0142anym przez inne urz\u0105dzenia w sieci lokalnej, bez konieczno\u015bci przeprowadzania wcze\u015bniejszego uwierzytelnienia.<\/p>\n\n\n\n<p>Atakuj\u0105cy mog\u0105 przej\u0105\u0107 kontrol\u0119 za pomoc\u0105 specjalnie spreparowanych \u017c\u0105dania SUBSCRIBE &#8211; warto\u015b\u0107 header nie jest sprawdzana. Mog\u0105 oni zapcha\u0107 \u017c\u0105dania spor\u0105 ilo\u015bci\u0105 URL na wszystkich podatnych urz\u0105dzeniach, przeci\u0105\u017caj\u0105c infrastruktur\u0119 co skutkuje denial of service.<\/p>\n\n\n\n<p>Atakuj\u0105cy mog\u0105 r\u00f3wnie\u017c wykrada\u0107 dane. Po\u0142\u0105czone urz\u0105dzenia cz\u0119sto ujawniaj\u0105 swoje identyfikatory. Drukarki mog\u0105 umo\u017cliwia\u0107 monitorowanie statusu drukowania, a routery podawa\u0107 szczeg\u00f3\u0142owe informacje o nazwach i adresach urz\u0105dze\u0144 w sieci. Jak wida\u0107 skala zagro\u017cenia zmienia si\u0119 w przypadku ka\u017cdego z typu produkt\u00f3w.<\/p>\n\n\n\n<p>17 kwietnia Open Connectivity Foundation (OCF) zaktualizowa\u0142o specyfikacj\u0119 protoko\u0142u UPnP. Fundacja powiadomi\u0142a tak\u017ce vendor\u00f3w i dostawc\u00f3w us\u0142ug internetowych o potrzebie dostosowania si\u0119 do nowej specyfikacji. Poniewa\u017c jednak wada le\u017cy na poziomie samego protoko\u0142u, mo\u017ce up\u0142yn\u0105\u0107 du\u017co wi\u0119cej czasu nim wszyscy dostawcy rozwi\u0105\u017c\u0105 ten problem.<\/p>\n\n\n\n<p>\u0179r\u00f3d\u0142a: <a rel=\"noreferrer noopener\" href=\"https:\/\/callstranger.com\/index.html\" target=\"_blank\">CallStranger.com<\/a> | <a rel=\"noreferrer noopener\" href=\"https:\/\/kb.cert.org\/vuls\/id\/339275\" target=\"_blank\">CERT Coordination Center<\/a> | <a rel=\"noreferrer noopener\" href=\"https:\/\/www.darkreading.com\/attacks-breaches\/vulnerability-in-plug-and-play-protocol-puts-billions-of-devices-at-risk\/d\/d-id\/1338032\" target=\"_blank\">Dark Reading<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"3-google-ksiazka-telefoniczna-uzytkownikow-whatsappa\">3. <strong>Google \u201cksi\u0105\u017ck\u0105 telefoniczn\u0105\u201d u\u017cytkownik\u00f3w WhatsAppa<\/strong><\/h2>\n\n\n<p>Na pocz\u0105tku tego roku dziennikarz Deutsche Welle Jordan Wildon zauwa\u017cy\u0142, \u017ce za po\u015brednictwem wyszukiwarek dost\u0119pne s\u0105 linki do prywatnych grup WhatsApp i Telegram. Ich wykorzystanie mog\u0142o skutkowa\u0107 do\u0142\u0105czeniem do grupy i dost\u0119pem do poufnych konwersacji.<\/p>\n\n\n\n<p>W minionym tygodniu badacz bezpiecze\u0144stwa Athul Jayaram odkry\u0142 wyciek danych w domenie WhatsApp \u201ewa.me\u201d, kt\u00f3ra w Google ujawnia\u0142a numery telefon\u00f3w u\u017cytkownik\u00f3w komunikatora. Domena \u201ewa.me\u201d s\u0142u\u017cy do hostowania link\u00f3w \u201ekliknij, aby rozpocz\u0105\u0107 czat\u201d, kt\u00f3re pozwalaj\u0105 u\u017cytkownikom zacz\u0105\u0107 konwersacj\u0119 z innymi bez zapisania ich numeru telefonu w ksi\u0105\u017cce adresowej.<\/p>\n\n\n\n<p>Aby utworzy\u0107 taki link, nale\u017cy u\u017cy\u0107 \u0142\u0105cza https:\/\/wa.me\/ &lt;numer&gt;, kt\u00f3ry jest pe\u0142nym numerem telefonu w formacie mi\u0119dzynarodowym. Okazuje si\u0119 jednak, \u017ce domeny \u201ewa.me\u201d lub \u201eapi.whatsapp.com\u201d umo\u017cliwiaj\u0105 indeksowanie dowolnych link\u00f3w, w tym https:\/\/wa.me\/ &lt;numer&gt; w Google. Tym samym umo\u017cliwia to odszukanie numer\u00f3w telefon\u00f3w u\u017cytkownik\u00f3w. I cho\u0107 wydaje si\u0119, \u017ce to tylko numery, atakuj\u0105cy na ich podstawie mog\u0105 odnale\u017a\u0107 profil u\u017cytkownika WhatsApp, a przy u\u017cyciu zdj\u0119cia profilowego zebra\u0107 dodatkowe informacje na temat swojej ofiary. Mog\u0105 r\u00f3wnie\u017c wysy\u0142a\u0107 wiadomo\u015bci lub dzwoni\u0107 do u\u017cytkownik\u00f3w oraz sprzeda\u0107 utworzon\u0105 na tej podstawie baz\u0119 numer\u00f3w spamerom i scamerom.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/securityaffairs.co\/wordpress\/104445\/digital-id\/google-indexed-whatsapp-numbers.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u0179r\u00f3d\u0142o<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"tekst-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"4-crosstalk-czyli-mlodszy-brat-spectre-i-meltdown\">4. <strong>CrossTalk, czyli m\u0142odszy brat Spectre i Meltdown<\/strong><\/h2>\n\n\n<p>W przypadku CrossTalk mamy do czynienia z atakiem typu Microarchitectural Data Sampling (MDS).&nbsp; Nowo odkryta podatno\u015b\u0107 mo\u017ce pos\u0142u\u017cy\u0107 do wycieku danych wprost z rdzeni procesora Intel. Umo\u017cliwia ona wykonywanie kodu przez atakuj\u0105cego na jednym rdzeniu procesora w celu wycieku wra\u017cliwych danych z oprogramowania dzia\u0142aj\u0105cego na innym rdzeniu. Atakuj\u0105cy wykorzystuje moment kiedy dane s\u0105 przetwarzane przez Line Fill Buffer (LBF) procesora.<\/p>\n\n\n\n<p>Naukowcy z Vrije University&#8217;s Systems and Network Security Group (Holandia) pracowali z Intelem nad opracowaniem \u0142atki od wrze\u015bnia 2018 r. Prawdopodobnie zadajecie sobie pytanie, dlaczego rozwi\u0105zanie problemu zaj\u0119\u0142o prawie 21 miesi\u0119cy\u2026 W du\u017cej mierze jest to spowodowane faktem, \u017ce podatno\u015b\u0107 by\u0142a bardzo z\u0142o\u017cona. W tym samym czasie Intel wprowadza\u0142 jednak ju\u017c zmiany w strukturze kolejnych procesor\u00f3w, dlatego wi\u0119kszo\u015b\u0107 nowych produkt\u00f3w nie jest podatna na ten atak. Co w takim razie ze starszymi modelami? Bez obaw. Przed kilkoma dniami firma Intel wyda\u0142a aktualizacj\u0119 mikrokodu (Intel-SA-00320), kt\u00f3ra rozwi\u0105zuje ten problem. Szczeg\u00f3\u0142owe informacje mo\u017cna znale\u017a\u0107 na <a href=\"https:\/\/blogs.intel.com\/technology\/2020\/06\/ipas-security-advisories-for-june-2020\/?li\" target=\"_blank\" rel=\"noreferrer noopener\">tej stronie<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"CrossTalk (SRBDS) leaking SGX key across CPU cores in 1 second\" width=\"1200\" height=\"900\" src=\"https:\/\/www.youtube.com\/embed\/7tba2ayE3cI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/new-crosstalk-attack-impacts-intels-mobile-desktop-and-server-cpus\/\" target=\"_blank\" rel=\"noreferrer noopener\">Czytaj wi\u0119cej<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Witamy w kolejnym zestawieniu Centrum Bezpiecze\u0144stwa Xopero! Protok\u00f3\u0142 SMB ma now\u0105 luk\u0119. SMBleed (CVE-2020-1206) umo\u017cliwia atakuj\u0105cemu doprowadzenie do wycieku pami\u0119ci j\u0105dra, bez konieczno\u015bci przeprowadzenia wcze\u015bniej jakiegokolwiek uwierzytelnienia. Wi\u0119cej dowiecie si\u0119 poni\u017cej.<\/p>\n","protected":false},"author":1,"featured_media":1597,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[436],"tags":[],"class_list":["post-2697","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news-pl","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SMBleed \/ Plug-and-Play podatne na atak \/ CrossTalk - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Protok\u00f3\u0142 SMB ma now\u0105 luk\u0119. SMBleed (CVE-2020-1206) umo\u017cliwia atakuj\u0105cemu doprowadzenie do wycieku pami\u0119ci j\u0105dra, bez konieczno\u015bci przeprowadzenia...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SMBleed \/ Plug-and-Play podatne na atak \/ CrossTalk - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Protok\u00f3\u0142 SMB ma now\u0105 luk\u0119. SMBleed (CVE-2020-1206) umo\u017cliwia atakuj\u0105cemu doprowadzenie do wycieku pami\u0119ci j\u0105dra, bez konieczno\u015bci przeprowadzenia...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-15T06:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T11:18:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"SMBleed \\\/ Plug-and-Play podatne na atak \\\/ CrossTalk\",\"datePublished\":\"2020-06-15T06:00:00+00:00\",\"dateModified\":\"2023-08-16T11:18:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/\"},\"wordCount\":1104,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/\",\"name\":\"SMBleed \\\/ Plug-and-Play podatne na atak \\\/ CrossTalk - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"datePublished\":\"2020-06-15T06:00:00+00:00\",\"dateModified\":\"2023-08-16T11:18:52+00:00\",\"description\":\"Protok\u00f3\u0142 SMB ma now\u0105 luk\u0119. SMBleed (CVE-2020-1206) umo\u017cliwia atakuj\u0105cemu doprowadzenie do wycieku pami\u0119ci j\u0105dra, bez konieczno\u015bci przeprowadzenia...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/blogg2.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/smbleed-plug-and-play-podatne-na-atak-crosstalk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SMBleed \\\/ Plug-and-Play podatne na atak \\\/ CrossTalk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SMBleed \/ Plug-and-Play podatne na atak \/ CrossTalk - Xopero Blog","description":"Protok\u00f3\u0142 SMB ma now\u0105 luk\u0119. SMBleed (CVE-2020-1206) umo\u017cliwia atakuj\u0105cemu doprowadzenie do wycieku pami\u0119ci j\u0105dra, bez konieczno\u015bci przeprowadzenia...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/","og_locale":"pl_PL","og_type":"article","og_title":"SMBleed \/ Plug-and-Play podatne na atak \/ CrossTalk - Xopero Blog","og_description":"Protok\u00f3\u0142 SMB ma now\u0105 luk\u0119. SMBleed (CVE-2020-1206) umo\u017cliwia atakuj\u0105cemu doprowadzenie do wycieku pami\u0119ci j\u0105dra, bez konieczno\u015bci przeprowadzenia...","og_url":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-06-15T06:00:00+00:00","article_modified_time":"2023-08-16T11:18:52+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"5 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"SMBleed \/ Plug-and-Play podatne na atak \/ CrossTalk","datePublished":"2020-06-15T06:00:00+00:00","dateModified":"2023-08-16T11:18:52+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/"},"wordCount":1104,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/","url":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/","name":"SMBleed \/ Plug-and-Play podatne na atak \/ CrossTalk - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","datePublished":"2020-06-15T06:00:00+00:00","dateModified":"2023-08-16T11:18:52+00:00","description":"Protok\u00f3\u0142 SMB ma now\u0105 luk\u0119. SMBleed (CVE-2020-1206) umo\u017cliwia atakuj\u0105cemu doprowadzenie do wycieku pami\u0119ci j\u0105dra, bez konieczno\u015bci przeprowadzenia...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/07\/blogg2.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/pl\/smbleed-plug-and-play-podatne-na-atak-crosstalk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"SMBleed \/ Plug-and-Play podatne na atak \/ CrossTalk"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=2697"}],"version-history":[{"count":12,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2697\/revisions"}],"predecessor-version":[{"id":5037,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2697\/revisions\/5037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/1597"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=2697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=2697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=2697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}