{"id":4495,"date":"2021-09-20T09:27:51","date_gmt":"2021-09-20T07:27:51","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=4495"},"modified":"2023-12-07T13:34:30","modified_gmt":"2023-12-07T12:34:30","slug":"omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/","title":{"rendered":"OMIGOD vulnerabilities \/ Apple fixed newest 0-day \/ Windows Subsystem for Linux"},"content":{"rendered":"\n<p>Welcome to&nbsp;<a href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Center<\/a>&nbsp;\u2013 our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks \u2013 precisely selected by our editors.<\/p>\n\n\n\n<p>Don\u2019t miss it out!&nbsp;<a href=\"https:\/\/xopero.com\/newsletter\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sign up now<\/a>&nbsp;and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.<\/p>\n\n\n\n<p>In the meantime, let\u2019s check what happened in the cyber-world last week.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"omigod-azure-users-warned-of-critical-omi-vulnerabilities\"><strong>OMIGOD: Azure users warned of critical OMI vulnerabilities<\/strong><\/h2>\n\n\n<p>Microsoft patched four vulnerabilities in Open Management Infrastructure (OMI), a widely used but little-known software agent embedded in many commonly used Azure services. Flaws collectively dubbed OMIGOD include remote code execution bug CVE-2021-38647 and privilege escalation vulnerabilities CVE-2021-38648, CVE-2021-38645, and CVE-2021-38649.<\/p>\n\n\n\n<p>These vulnerabilities affect several different services within Azure that silently use OMI, such as Azure Automation, Azure Automatic Update, Azure Operations Management Suite, Azure Log Analytics, Azure Configuration Management, and Azure Diagnostics.<\/p>\n\n\n\n<p>What is the OMI? It is an open-source UNIX\/Linux equivalent of Windows Management Instrumentation (WMI) that is deployed on many Linux virtual machines in Azure, enabling users to manage configurations across remote and local environments and collect statistics. When an organization sets up a Linux virtual machine (VM) in its cloud and enables any of these services, OMI is silently installed on its VM and runs at the highest privilege.<\/p>\n\n\n\n<p>Fix(it)? OMI is updated through the Azure service that installed it. Users should urgently verify that their environment is patched and that they&#8217;re running the latest version of OMI, 1.6.8.1. Extra caution is required. While OMI itself has been updated, it seems the Azure services still need an update. Right now they still deploy vulnerable OMIs when services are enabled on new machines.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/omigod-azure-users-warned-of-critical-omi-vulnerabilities\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"apple-issues-urgent-updates-to-fix-new-zeroday-linked-to-pegasus-spyware\"><strong>Apple issues urgent updates to fix new zero-day linked to Pegasus spyware<\/strong><\/h2>\n\n\n<p>Apple has released iOS 14.8, iPadOS 14.8, watchOS 7.6.2, macOS Big Sur 11.6, and Safari 14.1.2 to fix two actively exploited vulnerabilities. The first one &#8211; CVE-2021-30858 (WebKit) &#8211; could result in arbitrary code execution when processing maliciously crafted web content. The flaw has been addressed with improved memory management. And the second &#8211; CVE-2021-30860 (CoreGraphics) &#8211; could lead to arbitrary code execution when processing a maliciously crafted PDF document. The bug has been remediated with improved input validation. Apple iPhone, iPad, Mac, and Apple Watch users are advised to immediately update their software to mitigate any potential threats arising out of active exploitation of the flaws.<\/p>\n\n\n\n<p>Possible threats. The updates arrive weeks after researchers revealed details of a zero-day exploit called &#8222;FORCEDENTRY&#8221; (aka Megalodon). Besides being triggered simply by sending a malicious message to the target, FORCEDENTRY is also notable for the fact that it expressly undermines a new software security feature called BlastDoor that Apple baked into iOS 14 to prevent zero-click intrusions by filtering untrusted data sent over iMessage.<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2021\/09\/apple-issues-urgent-updates-to-fix-new.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-malware-uses-windows-subsystem-for-linux-for-stealthy-attacks\"><strong>New malware uses Windows Subsystem for Linux for stealthy attacks<\/strong><\/h2>\n\n\n<p>Security researchers have discovered malicious Linux binaries created for the Windows Subsystem for Linux (WSL), indicating that hackers are trying out new methods to compromise Windows machines.<\/p>\n\n\n\n<p>Right now researchers believe that the code is still being developed. Less than a month ago, one of the malicious Linux files was detected by just one antivirus engine on VirusTotal. Refreshing the scan on another sample showed that it went completely undetected by the engines on the scanning service. One of the variants, written completely in Python 3, does not use any Windows API and seems to be the first attempt at a loader for WSL. It uses standard Python libraries, which makes it compatible with both Windows and Linux. Another \u201cELF to Windows\u201d loader variant relied on PowerShell to inject and execute the shellcode. One of these samples used Python to call functions that killed the running antivirus solution, established persistence on the system, and run a PowerShell script every 20 seconds.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-malware-uses-windows-subsystem-for-linux-for-stealthy-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"more-it-security-mustreads\">More IT security must-reads<\/h2>\n\n\n<ol class=\"wp-block-list\"><li>WhatsApp\u2019s End-to-End Encryption Isn\u2019t Actually Broken (<a href=\"https:\/\/threatpost.com\/whatsapp-end-encryption-broken\/169399\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Threat Post<\/a>)<\/li><li>Attackers exploit CVE-2021-26084 for XMRig crypto mining on affected Confluence servers (<a href=\"https:\/\/www.imperva.com\/blog\/attackers-exploit-cve-2021-26084-for-xmrig-crypto-mining-on-affected-confluence-servers\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Imperva Blog<\/a>)<\/li><li>Google patches two Chrome zero-days (<a href=\"https:\/\/www.zdnet.com\/article\/google-patches-two-chrome-zero-days\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ZDNet<\/a>)<\/li><li>Popular NPM package Pac-Resolver affected by a critical flaw (<a href=\"https:\/\/securityaffairs.co\/wordpress\/122182\/security\/npm-package-pac-resolver-flaw.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<\/li><li>Serious Flaw Found in HP OMEN Driver (<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/serious-flaw-found-in-hp-omen\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Infosecurity Magazine<\/a>)<\/li><li>Vermilion Strike, a Linux implementation of Cobalt Strike Beacon used in attacks (<a href=\"https:\/\/securityaffairs.co\/wordpress\/122172\/malware\/cobalt-strike-beacon.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<\/li><li>Ransomware gang threatens to wipe decryption key if negotiator hired (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-gang-threatens-to-wipe-decryption-key-if-negotiator-hired\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/li><li>Patch now! <a href=\"https:\/\/xopero.com\/blog\/pl\/printnightmare-do-pilnej-aktualizacji-atak-na-kaseya-wd-z-nowym-0-day\/\">PrintNightmare<\/a> over, MSHTML fixed, a new horror appears \u2026 OMIGOD (<a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2021\/09\/patch-now-printnightmare-over-mshtml-fixed-a-new-horror-appears-omigod\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Malwarebytes Lab<\/a>)<\/li><li>Microsoft rolls out passwordless login for all Microsoft accounts (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-rolls-out-passwordless-login-for-all-microsoft-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<\/li><\/ol>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Welcome to&nbsp;Security Center&nbsp;\u2013 our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks \u2013 precisely selected by our editors. Don\u2019t miss it out!&nbsp;Sign up now&nbsp;and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure. In the meantime, let\u2019s check what happened in the cyber-world last week.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-4495","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OMIGOD vulnerabilities \/ Apple fixed newest 0-day \/ Windows Subsystem for Linux<\/title>\n<meta name=\"description\" content=\"Stay ahead of cybersecurity threats! Dive into the latest on OMIGOD vulnerabilities, Apple&#039;s swift fix for the newest 0-day exploit, and explore the evolving landscape of Windows Subsystem for Linux.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OMIGOD vulnerabilities \/ Apple fixed newest 0-day \/ Windows Subsystem for Linux\" \/>\n<meta property=\"og:description\" content=\"Stay ahead of cybersecurity threats! Dive into the latest on OMIGOD vulnerabilities, Apple&#039;s swift fix for the newest 0-day exploit, and explore the evolving landscape of Windows Subsystem for Linux.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-20T07:27:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-07T12:34:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"OMIGOD vulnerabilities \\\/ Apple fixed newest 0-day \\\/ Windows Subsystem for Linux\",\"datePublished\":\"2021-09-20T07:27:51+00:00\",\"dateModified\":\"2023-12-07T12:34:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/\"},\"wordCount\":782,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/\",\"name\":\"OMIGOD vulnerabilities \\\/ Apple fixed newest 0-day \\\/ Windows Subsystem for Linux\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2021-09-20T07:27:51+00:00\",\"dateModified\":\"2023-12-07T12:34:30+00:00\",\"description\":\"Stay ahead of cybersecurity threats! Dive into the latest on OMIGOD vulnerabilities, Apple's swift fix for the newest 0-day exploit, and explore the evolving landscape of Windows Subsystem for Linux.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OMIGOD vulnerabilities \\\/ Apple fixed newest 0-day \\\/ Windows Subsystem for Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OMIGOD vulnerabilities \/ Apple fixed newest 0-day \/ Windows Subsystem for Linux","description":"Stay ahead of cybersecurity threats! Dive into the latest on OMIGOD vulnerabilities, Apple's swift fix for the newest 0-day exploit, and explore the evolving landscape of Windows Subsystem for Linux.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/","og_locale":"pl_PL","og_type":"article","og_title":"OMIGOD vulnerabilities \/ Apple fixed newest 0-day \/ Windows Subsystem for Linux","og_description":"Stay ahead of cybersecurity threats! Dive into the latest on OMIGOD vulnerabilities, Apple's swift fix for the newest 0-day exploit, and explore the evolving landscape of Windows Subsystem for Linux.","og_url":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-09-20T07:27:51+00:00","article_modified_time":"2023-12-07T12:34:30+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"4 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"OMIGOD vulnerabilities \/ Apple fixed newest 0-day \/ Windows Subsystem for Linux","datePublished":"2021-09-20T07:27:51+00:00","dateModified":"2023-12-07T12:34:30+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/"},"wordCount":782,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/","url":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/","name":"OMIGOD vulnerabilities \/ Apple fixed newest 0-day \/ Windows Subsystem for Linux","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2021-09-20T07:27:51+00:00","dateModified":"2023-12-07T12:34:30+00:00","description":"Stay ahead of cybersecurity threats! Dive into the latest on OMIGOD vulnerabilities, Apple's swift fix for the newest 0-day exploit, and explore the evolving landscape of Windows Subsystem for Linux.","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/omigod-vulnerabilities-apple-fixed-newest-0-day-windows-subsystem-for-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"OMIGOD vulnerabilities \/ Apple fixed newest 0-day \/ Windows Subsystem for Linux"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=4495"}],"version-history":[{"count":3,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4495\/revisions"}],"predecessor-version":[{"id":5415,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4495\/revisions\/5415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=4495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=4495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=4495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}