{"id":2751,"date":"2020-06-22T11:05:14","date_gmt":"2020-06-22T09:05:14","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=2751"},"modified":"2023-08-16T14:44:55","modified_gmt":"2023-08-16T12:44:55","slug":"ripple20-affects-hundreds-of-millions-of-devices","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/","title":{"rendered":"Ripple20 affects hundreds of millions of devices"},"content":{"rendered":"\n<p>Welcome to the next episode of the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\">Xopero Security Center<\/a>! This time we are sharing security news about the Ripple20 vulnerability set, which affects a widely used low-level TCP\/IP library. Researchers discovered 19 dangerous 0-day (sic!). Unfortunately, there is no easy solution. At last for now&#8230; <\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<!--more-->\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-ripple20-effect-19-zerodays-impacts-everything-from-printers-to-infusion-pumps\"><strong>The Ripple20 effect &#8211; 19 zero-days impacts everything from printers to infusion pumps<\/strong><\/h2>\n\n\n<p>Ripple20 is a set of 19 vulnerabilities which resides in a low-level TCP\/IP software library developed by Treck, It could be weaponized and used by remote attackers to gain complete control over targeted devices without requiring any user interaction.<\/p>\n\n\n<h6 class=\"wp-block-heading\" id=\"ripple20-19-vulnerabilities-which-score-between-31-and-over-9-cvss\"><strong>Ripple20<\/strong> &#8211; 19 vulnerabilities which score between 3.1 and over 9 CVSS<\/h6>\n\n\n<p>There are four critical vulnerabilities in Treck TCP\/IP stack, with CVSS scores over 9, which could let attackers execute arbitrary code on targeted devices remotely, and one critical bug affects the DNS protocol. The other 15 vulnerabilities are in ranging degrees of severity with CVSS score ranging from 3.1 to 8.2, and effects ranging from Denial of Service to potential Remote Code Execution.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"JSOF Ripple20 Exploit UPS\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/jkfNE_Twa1s?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Researchers from JSOF reported their findings to Treck company, who then patched most of the flaws with the release of TCP\/IP stack version 6.0.1.67 or higher. They also contacted vendors, including &#8211; HP, Schneider Electric, Intel, Rockwell Automation, Caterpillar, Baxter, and Quadros &#8211; many of which have already acknowledged the Ripple20 flaw. But there still is millions of devices which will not receive security patch updates anytime soon. The affected devices are in use across various industries, ranging from home\/consumer devices to medical, healthcare, data centers, enterprises, telecom, oil, gas, nuclear, transportation, and many others across critical infrastructure.<\/p>\n\n\n<h6 class=\"wp-block-heading\" id=\"ripple20-how-to-protect-your-organization-against-possible-intrusion\">Ripple20 &#8211; how to protect your organization against possible intrusion <\/h6>\n\n\n<p>Cybersecurity specialists recommend then that all control system devices should not be accessible from the Internet. Admins should hide control system networks and remote devices behind firewalls and isolate them from the business network. It is also recommended to make them not accessible from the Internet.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2020\/06\/new-critical-flaws-put-billions-of.html\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"there-is-a-bug-in-usb-for-remote-desktop-which-enables-adding-fake-devices\"><strong>There is a bug in \u201eUSB for Remote Desktop\u201d which enables adding fake devices<\/strong><\/h2>\n\n\n<p>The vulnerability identified as CVE-2020-9332 resides in the bus driver for \u201cUSB for Remote Desktop\u201d developed by FabulaTech. It could be used to elevate privileges on a target machine by adding fake devices.<\/p>\n\n\n\n<p>The USB redirection solutions work through client\/server-side software. Information about the redirected device collected by the client-side software is sent to the server running on the remote machine. Using a bus driver, the server creates and instructs a virtual object to repeat all the input-output communication from the real device.<\/p>\n\n\n\n<p>The bus driver calls the insecure IoCreateDevice routine that does not have security checks to block access from less privileged entities. This way the operating system on the remote system can be tricked to believe that a real USB\u200c device is connected. Furthermore, FabulaTech services run under LocalSystem account, which has extensive privileges on the computer.<\/p>\n\n\n\n<p>Attackers could simulate any USB\u200c device, A fake mouse pointer could be used to bypass User Account Control security feature in Windows. There are also more advanced attacks are possible, like adding an ethernet network card for intercepting traffic. The sky is the limit\u2026<\/p>\n\n\n\n<p><strong>Can we fix this problem?<\/strong><\/p>\n\n\n\n<p>Researchers from SentinelOne emailed FabulaTech, first on January 29 and then again on February 4 but received no reply\u2026 Every attempts to report a bug have been ignored. But now FabulaTech published a first official statement. The bug will be addressed in the shortest time possible in the near future. Nice to know the more so because they have a very high-profile customers list. Among them are Google, Microsoft, BMW, MasterCard, NASA, Reuters, Intel, Shell, Xerox, Harvard, General Electric, and Raiffeisen Bank.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bug-in-usb-for-remote-desktop-lets-hackers-add-fake-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"oracle-ebusiness-suite-flaws-let-hackers-hijack-financial-operations\"><strong>Oracle E-Business Suite flaws let hackers hijack financial operations<\/strong><\/h2>\n\n\n<p>If your business operations and security of sensitive data rely on Oracle&#8217;s E-Business Suite (EBS), make sure you recently updated and are running the latest available version of the software. Why?<\/p>\n\n\n\n<p>A report released by cybersecurity firm Onapsis, discloses technical details for vulnerabilities reported in Oracle&#8217;s E-Business Suite (EBS), an integrated group of applications designed to automate CRM, ERP, and SCM operations for organizations.<\/p>\n\n\n\n<p>The two vulnerabilities, dubbed &#8222;BigDebIT&#8221; and rated a CVSS score of 9.9, were patched by Oracle in a critical patch update (CPU) pushed out earlier in January. But the company admitted an estimated 50 percent of EBS customers have not deployed it to date.<\/p>\n\n\n\n<p>The security flaws could be exploited by bad actors to target accounting tools such as General Ledger in a bid to steal sensitive information and commit financial fraud.<\/p>\n\n\n\n<p>According to the researchers, &#8222;an unauthenticated hacker could perform an automated exploit on the General Ledger module to extract assets from a company (such as cash) and modify accounting tables, without leaving a trace.&#8221;<\/p>\n\n\n\n<p>Successful exploitation of this vulnerability would allow an attacker to steal confidential information, financial fraud and cause delays in any financial reporting related to the company&#8217;s compliance processes.<\/p>\n\n\n\n<p>Tracked as CVE-2020-2586 and CVE-2020-2587, the new flaws reside in its Oracle Human Resources Management System (HRMS) in a component called Hierarchy Diagrammer that enables users to create organization and position hierarchies associated with an enterprise. Together, they can be exploited even if EBS customers have deployed patches released in April 2019. That is why it is important to install the latest updates from January. Better do it now!&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2020\/06\/oracle-e-business-suite.html\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"aws-said-it-mitigated-a-23-tbps-ddos-attack-the-largest-ever\"><strong>AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever<\/strong><\/h2>\n\n\n<p>Amazon said its AWS Shield service mitigated the largest DDoS attack ever, stopping a 2.3 Tbps attack in mid-February this year.<\/p>\n\n\n\n<p>The incident was disclosed in the company&#8217;s AWS Shield Threat Landscape, a report detailing web attacks mitigated by Amazon&#8217;s AWS Shield protection service. The report didn&#8217;t identify the targeted AWS customer but said the attack was carried out using hijacked CLDAP (Connection-less Lightweight Directory Access Protocol) web servers and caused three days of &#8222;elevated threat&#8221; for its AWS Shield staff.<\/p>\n\n\n\n<p>The protocol has been abused for DDoS attacks since late 2016, and CLDAP servers are known to amplify DDoS traffic by 56 to 70 times its initial size, making it a highly sought-after protocol and a common option provided by DDoS-for-hire services.&nbsp;<\/p>\n\n\n\n<p>The previous record for the largest DDoS attack ever recorded was of 1.7 Tbps, mitigated by NETSCOUT Arbor in March 2018.<\/p>\n\n\n\n<p>Nowadays, most DDoS attacks usually peak in the 500 Gbps range, which is why news of the AWS 2.3 Tbps attack was a surprise for industry players.<\/p>\n\n\n\n<p>Earlier same day, Akamai reported of mitigating a DDoS attack of 1.44 Tbps in the first week of June 2020.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/aws-said-it-mitigated-a-2-3-tbps-ddos-attack-the-largest-ever\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Old GTP protocol vulnerabilities will also impact future 5G networks (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks\/\" target=\"_blank\">ZDNet<\/a>)<br>2. Exposed Cloud Databases Attacked 18 Times Per Day (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/exposed-cloud-databases-attacked\/\" target=\"_blank\">Infosecurity Magazine<\/a>)<br>3. Intel adds CPU-level malware protection to Tiger Lake processors (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/intel-adds-cpu-level-malware-protection-to-tiger-lake-processors\/\" target=\"_blank\">Bleeping Computer<\/a>)<br>4. Black Kingdom ransomware hacks networks with Pulse VPN flaws (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/black-kingdom-ransomware-hacks-networks-with-pulse-vpn-flaws\/\" target=\"_blank\">Bleeping Computer<\/a>)<br>5. Tech firms suspend use of \u2018biased\u2019 facial recognition technology (<a rel=\"noreferrer noopener\" href=\"https:\/\/securityaffairs.co\/wordpress\/104737\/digital-id\/facial-recognition-tech-firms\" target=\"_blank\">Security Affairs<\/a>)<br>6. T-Mobile Outage Mistaken for Massive DDoS Attack on U.S. (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.securityweek.com\/t-mobile-outage-mistaken-massive-ddos-attack-us\" target=\"_blank\">Security Week<\/a>)<br>7 Eavesdroppers can use light bulbs to listen in from afar (<a rel=\"noreferrer noopener\" href=\"https:\/\/nakedsecurity.sophos.com\/2020\/06\/16\/eavesdroppers-can-use-light-bulbs-to-listen-in-from-afar\/\" target=\"_blank\">Naked Security<\/a>)<br>8. Plex fixes Media Server bugs allowing full system takeover (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/plex-fixes-media-server-bugs-allowing-full-system-takeover\/\" target=\"_blank\">Bleeping Computer<\/a>)<br>9. Cyber spies use LinkedIn to hack European defense firms (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.reuters.com\/article\/us-cyber-linkedin-hacks-idUSKBN23O2L7\" target=\"_blank\">Reuters<\/a>)<br>10. Windows 10 2004 may break Storage Spaces, avoid using chkdsk (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-10-2004-may-break-storage-spaces-avoid-using-chkdsk\/\" target=\"_blank\">Bleeping Computer<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the next episode of the&nbsp;Xopero Security Center! This time we are sharing security news about the Ripple20 vulnerability set, which affects a widely used low-level TCP\/IP library. Researchers discovered 19 dangerous 0-day (sic!). Unfortunately, there is no easy solution. At last for now&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-2751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ripple20 affects hundreds of millions of devices - Xopero Blog<\/title>\n<meta name=\"description\" content=\"This time we are sharing with security news about the Ripple20 vulnerability set, which affects a widely used low-level TCP\/IP library. Researchers...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ripple20 affects hundreds of millions of devices - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"This time we are sharing with security news about the Ripple20 vulnerability set, which affects a widely used low-level TCP\/IP library. Researchers...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-22T09:05:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T12:44:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Ripple20 affects hundreds of millions of devices\",\"datePublished\":\"2020-06-22T09:05:14+00:00\",\"dateModified\":\"2023-08-16T12:44:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/\"},\"wordCount\":1218,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/\",\"name\":\"Ripple20 affects hundreds of millions of devices - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-06-22T09:05:14+00:00\",\"dateModified\":\"2023-08-16T12:44:55+00:00\",\"description\":\"This time we are sharing with security news about the Ripple20 vulnerability set, which affects a widely used low-level TCP\\\/IP library. Researchers...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/ripple20-affects-hundreds-of-millions-of-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ripple20 affects hundreds of millions of devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ripple20 affects hundreds of millions of devices - Xopero Blog","description":"This time we are sharing with security news about the Ripple20 vulnerability set, which affects a widely used low-level TCP\/IP library. Researchers...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/","og_locale":"pl_PL","og_type":"article","og_title":"Ripple20 affects hundreds of millions of devices - Xopero Blog","og_description":"This time we are sharing with security news about the Ripple20 vulnerability set, which affects a widely used low-level TCP\/IP library. Researchers...","og_url":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-06-22T09:05:14+00:00","article_modified_time":"2023-08-16T12:44:55+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Ripple20 affects hundreds of millions of devices","datePublished":"2020-06-22T09:05:14+00:00","dateModified":"2023-08-16T12:44:55+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/"},"wordCount":1218,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/","url":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/","name":"Ripple20 affects hundreds of millions of devices - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-06-22T09:05:14+00:00","dateModified":"2023-08-16T12:44:55+00:00","description":"This time we are sharing with security news about the Ripple20 vulnerability set, which affects a widely used low-level TCP\/IP library. Researchers...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/ripple20-affects-hundreds-of-millions-of-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Ripple20 affects hundreds of millions of devices"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=2751"}],"version-history":[{"count":18,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2751\/revisions"}],"predecessor-version":[{"id":5066,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2751\/revisions\/5066"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=2751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=2751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=2751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}