Nearly one million Windows computers are vulnerable to BlueKeep, a Remote Desktop Protocol (RDP) security vulnerability that affects older versions of the Windows operating system.
This number comes to reduce the initial fears of being over seven million Appliances was in danger, though the danger still exists, as a million devices is no joke.
The BlueKeep vulnerability, which has been given the feature CVE-2019-0708, has been working with computer and cyber security communities in the last two weeks.
The problem appeared in Patch Tuesday May 2019, earlier this month.
Microsoft then released the security updates but he warned that because BlueKeep's flaw is a worm, which means that hackers and malicious software might potentially abuse the vulnerability to double the casualties after the worm spreads itself substantially.
As with the EnternalBlue SMB during the WannaCry, NotPetya the 2017.
However, despite the level of risk of vulnerability, there have been no attacks, mainly because there is no public PoC, which can be adapted to attack.
Certain scans have been observed, but it is not clear who is behind them, according to security firm GreyNoise, who noticed the weekend activity.
The good news is that Companies can immediately apply repairs to mitigate this risk. The updates are currently in circulation and are available for Windows XP (!), 7, Server 2003 and Server 2008, all versions of Windows that are vulnerable to BlueKeep attacks.
In research published today, Robert Graham, head of research companyς ασφαλείας Errata Security και προγραμματιστής του βοηθητικού προγράμματος σάρωσης Internet Masscan, αποκάλυψε ακριβή στατιστικά στοιχεία σχετικά με τον αριθμό των συστημάτων των Windows που εξακολουθούν να είναι ευάλωτα σε επιθέσεις BlueKeep.
While initially believed that there are almost 7,6 million Windows systems that are connected to the Internet and vulnerable to attacks, Graham said today that the number is actually around at 950,000.
Most of the seven million systems that have 3389 ports (RDP exposed on the Internet are not actually Windows systems or some RDP service on this door, as Graham discovered.
The researcher reported that the majority of Windows systems with RDP directly exposed on the Internet are safe, since there are millions of such devices that respond to scans in a specific way around 1,5.
Hackers are likely to start intense attacks next month and cause havoc on these machines
In addition, due to the limitations of his shots, Graham was unable to test Windows systems on internal networks, which most likely hide most vulnerable computers.
The tool that Graham used during his research is available at GitHub named rdpscan. This is a mix of its own masscan tool and a BlueKeep scanner set was developed by RiskSense.