{"id":63496,"date":"2026-05-07T08:03:07","date_gmt":"2026-05-07T08:03:07","guid":{"rendered":"https:\/\/www.europesays.com\/sk\/63496\/"},"modified":"2026-05-07T08:03:07","modified_gmt":"2026-05-07T08:03:07","slug":"chyba-v-androide-umoznuje-ovladnut-vas-telefon-bez-jedineho-kliknutia","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/sk\/63496\/","title":{"rendered":"Chyba v Androide umo\u017e\u0148uje ovl\u00e1dnu\u0165 v\u00e1\u0161 telef\u00f3n bez jedin\u00e9ho kliknutia!"},"content":{"rendered":"<p>Spolo\u010dnos\u0165 Google vydala mimoriadne varovanie, v ktorom naliehavo \u017eiada pou\u017e\u00edvate\u013eov syst\u00e9mu Android, aby si okam\u017eite aktualizovali svoje zariadenia. D\u00f4vodom je objavenie kritickej bezpe\u010dnostnej chyby, ktor\u00e1 by \u00fato\u010dn\u00edkom mohla umo\u017eni\u0165 \u00faplne ovl\u00e1dnu\u0165 smartf\u00f3n bez toho, aby k tomu potrebovali ak\u00e9ko\u013evek povolenia alebo interakciu so samotn\u00fdm majite\u013eom. T\u00e1to zranite\u013enos\u0165, identifikovan\u00e1<a href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2026\/2026-05-01\" rel=\"nofollow noopener\" target=\"_blank\"> pod ozna\u010den\u00edm CVE-2026-0073,<\/a> bola s\u00edce zapl\u00e1tan\u00e1 v najnov\u0161ej aktualiz\u00e1cii, no skuto\u010dn\u00e1 ochrana teraz z\u00e1vis\u00ed od toho, ako r\u00fdchlo jednotliv\u00ed v\u00fdrobcovia telef\u00f3nov doru\u010dia t\u00fato opravu k svojim pou\u017e\u00edvate\u013eom.<\/p>\n<p>Pre\u010do je chyba CVE-2026-0073 tak\u00e1 nebezpe\u010dn\u00e1?<\/p>\n<p>To, \u010do rob\u00ed t\u00fato situ\u00e1ciu mimoriadne znepokojuj\u00facou, je fakt, \u017ee zranite\u013enos\u0165 z\u00edskala hodnotenie \u201ezero-click\u201c. V praxi to znamen\u00e1, \u017ee \u00fato\u010dn\u00edk nepotrebuje obe\u0165 oklama\u0165 \u017eiadnym phishingom, podvodn\u00fdm odkazom ani met\u00f3dami soci\u00e1lneho in\u017einierstva. Chyba sa nach\u00e1dza v samotnom jadre opera\u010dn\u00e9ho syst\u00e9mu, pod \u00farov\u0148ou be\u017en\u00fdch aplik\u00e1ci\u00ed a pou\u017e\u00edvate\u013esk\u00fdch nastaven\u00ed, \u010do znamen\u00e1, \u017ee po jej zneu\u017eit\u00ed m\u00f4\u017ee by\u0165 zasiahnut\u00e9 a sledovan\u00e9 cel\u00e9 zariadenie.<\/p>\n<p>Pod\u013ea bezpe\u010dnostn\u00e9ho bulletinu Google sa t\u00e1to hrozba t\u00fdka najnov\u0161\u00edch verzi\u00ed syst\u00e9mu, konkr\u00e9tne Androidu 14, 15 a 16. K zneu\u017eitiu m\u00f4\u017ee d\u00f4js\u0165, ak sa \u00fato\u010dn\u00edk nach\u00e1dza v tesnej bl\u00edzkosti obete alebo na rovnakej sie\u0165ovej infra\u0161trukt\u00fare. \u00dato\u010dn\u00edkovi sta\u010d\u00ed spusti\u0165 k\u00f3d na dia\u013eku s pr\u00e1vami syst\u00e9mov\u00e9ho pou\u017e\u00edvate\u013ea (shell user), pri\u010dom na pozad\u00ed nedoch\u00e1dza k \u017eiadnym vidite\u013en\u00fdm zmen\u00e1m, ktor\u00e9 by majite\u013e telef\u00f3nu mohol postrehn\u00fa\u0165.<\/p>\n<p>Mohlo by v\u00e1s zauj\u00edma\u0165:<\/p>\n<p>Reklama<\/p>\n<p>Zneu\u017eitie n\u00e1stroja, ktor\u00fd nemal by\u0165 pr\u00edstupn\u00fd<\/p>\n<p>Slabina bola odhalen\u00e1 v rozhran\u00ed Android Debug Bridge (ADB). Ide o zabudovan\u00fa funkciu, ktor\u00fa in\u017einieri a v\u00fdvoj\u00e1ri vyu\u017e\u00edvaj\u00fa na komunik\u00e1ciu medzi po\u010d\u00edta\u010dom a mobiln\u00fdm zariaden\u00edm. Probl\u00e9mom je, \u017ee tento n\u00e1stroj nebol nikdy ur\u010den\u00fd na to, aby bol pr\u00edstupn\u00fd alebo odhalen\u00fd v be\u017enej prev\u00e1dzke na \u017eiv\u00fdch zariadeniach sp\u00f4sobom, ak\u00fdm k nemu teraz m\u00f4\u017eu prist\u00fapi\u0165 hackeri.<\/p>\n<p>Bezpe\u010dnostn\u00fd expert Adam Boynton zo spolo\u010dnosti Jamf upozor\u0148uje, \u017ee tento incident odzrkad\u013euje architekt\u00faru, ktor\u00fa roky vyu\u017e\u00edvaj\u00fa profesion\u00e1lni oper\u00e1tori spywaru. Ide o nebezpe\u010dn\u00fd vzorec, kedy \u00fato\u010dn\u00edk z\u00edska pr\u00edstup na \u00farovni cel\u00e9ho syst\u00e9mu bez potreby akejko\u013evek akcie pou\u017e\u00edvate\u013ea a bez toho, aby telef\u00f3n vykazoval ak\u00e9ko\u013evek zn\u00e1mky napadnutia.<\/p>\n<p>Ako sa br\u00e1ni\u0165 a kedy pr\u00edde z\u00e1chrana?<\/p>\n<p>Ke\u010f\u017ee \u00fatok nevy\u017eaduje \u017eiadnu interakciu, be\u017en\u00fd pou\u017e\u00edvate\u013e sa mu nem\u00e1 ako vyhn\u00fa\u0165 inak ne\u017e d\u00f4sledn\u00fdm aktualizovan\u00edm softv\u00e9ru. Google potvrdil, \u017ee opravu vyd\u00e1va v r\u00e1mci bezpe\u010dnostnej aktualiz\u00e1cie z 1. m\u00e1ja 2026.<\/p>\n<p>D\u00f4le\u017eit\u00e9 inform\u00e1cie o distrib\u00facii opravy:<\/p>\n<p>Zariadenia Pixel od spolo\u010dnosti Google dost\u00e1vaj\u00fa aktualiz\u00e1ciu ako prv\u00e9 v porad\u00ed.<\/p>\n<p>Ostatn\u00ed v\u00fdrobcovia, ako napr\u00edklad Samsung, bud\u00fa opravu uvo\u013e\u0148ova\u0165 postupne v r\u00e1mci vlastn\u00fdch harmonogramov.<\/p>\n<p>Google uvo\u013en\u00ed zdrojov\u00fd k\u00f3d opravy pre projekt AOSP do 48 hod\u00edn, \u010do umo\u017en\u00ed ostatn\u00fdm zna\u010dk\u00e1m integrova\u0165 z\u00e1platu do svojich syst\u00e9mov.<\/p>\n<p>Odpor\u00fa\u010da sa manu\u00e1lne kontrolova\u0165 dostupnos\u0165 aktualiz\u00e1ci\u00ed v nastaveniach telef\u00f3nu a ne\u010daka\u0165 na automatick\u00e9 ozn\u00e1menie syst\u00e9mu.<\/p>\n<p>Hoci Google v \u010dase zverejnenia spr\u00e1vy neregistroval \u017eiadne akt\u00edvne zneu\u017e\u00edvanie chyby CVE-2026-0073, obavy s\u00fa na mieste. Len v marci toti\u017e spolo\u010dnos\u0165 potvrdila in\u00fa chybu (CVE-2026-21385) t\u00fdkaj\u00facu sa grafiky Qualcomm, ktor\u00e1 bola re\u00e1lne zneu\u017eit\u00e1 na pr\u00edstup k citliv\u00fdm d\u00e1tam v pam\u00e4ti telef\u00f3nov. Jedinou skuto\u010dnou obranou tak zost\u00e1va udr\u017eiavanie zariadenia v aktu\u00e1lnom stave a neust\u00e1le sledovanie bezpe\u010dnostn\u00fdch hl\u00e1sen\u00ed od v\u00fdrobcu.<\/p>\n","protected":false},"excerpt":{"rendered":"Spolo\u010dnos\u0165 Google vydala mimoriadne varovanie, v ktorom naliehavo \u017eiada pou\u017e\u00edvate\u013eov syst\u00e9mu Android, aby si okam\u017eite aktualizovali svoje zariadenia.&hellip;\n","protected":false},"author":2,"featured_media":63497,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[12309,64,65,66,3600,43,40,39,42,41],"class_list":{"0":"post-63496","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ekonomika","8":"tag-android","9":"tag-business","10":"tag-economic","11":"tag-ekonomika","12":"tag-google","13":"tag-sk","14":"tag-slovak","15":"tag-slovakia","16":"tag-slovencina","17":"tag-slovensko"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@sk\/116532255457161731","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/sk\/wp-json\/wp\/v2\/posts\/63496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/sk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/sk\/wp-json\/wp\/v2\/comments?post=63496"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/sk\/wp-json\/wp\/v2\/posts\/63496\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/sk\/wp-json\/wp\/v2\/media\/63497"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/sk\/wp-json\/wp\/v2\/media?parent=63496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/sk\/wp-json\/wp\/v2\/categories?post=63496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/sk\/wp-json\/wp\/v2\/tags?post=63496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}