BlueKeep RDP Vulnerability Can Affect 1 Million Windows System

0

Earlier this month, Microsoft released an emergency patch to fix a severe bug existing in the Remote Desktop Protocol (RDP). This vulnerability has affected all the version Windows operating system. This bug is being called as BlueKeep.

This bug can lead to seeing another WannaCry situation. Microsoft officially reported about this bug and also provided the patch to get rid of this vulnerability. The company has advised all the Windows to download and install the patch to fix this bug as soon as possible.

According to the Errata Security reports, 1 million PCs are still left to install the patch but most of the Windows users have also installed the security patch thus securing their PCs. There were about 7.6 million PCs affected due to this vulnerability.

Talking about the BlueKeep bug, this vulnerability can be used to implement remote code execution attacks. According to Microsoft, this bug is "Warmable". Warmable means that the hacker can use this bug to create self-replicating exploits. This vulnerability will affect Windows 7, Windows XP, Windows Vista, Windows 2003, Windows Server 2008 and 2008 R2.

The BlueKeep (CVE-2019-0708) security patch was released on 14th May. According to  GreyNoise and their researchers, sweeping test for BlueKeep RDP vulnerability from many hosts around the internet has been observed.

Chris Goettl, the director of product management for security at Ivanti said that "this bug has the potential of a global WannaCry-level event".

Graham in the form of a warning message said that the hackers will be able to find a robust exploit by the next month or two and cause a very severe attack on the machines which are still left to install the BlueKeep bug security patch.

READ ⇒
5 tips to protect your Wifi network

For your information, no BluKeep attacks have been discovered till now but it is highly advised to install the latest patch on your Windows system to avoid seeing another situation like WannaCr or notPetya.

Leave A Reply

Your email address will not be published.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. AcceptRead More