in

More than 245,000 Windows systems still remain vulnerable to BlueKeep RDP bug

Image: Jan Kopriva

A year and a half after Microsoft disclosed the BlueKeep vulnerability impacting the Windows RDP service, more than 245,000 Windows systems still remain unpatched and vulnerable to attacks.

The number represents around 25% of the 950,000 systems that were initially discovered to be vulnerable to BlueKeep attacks during a first scan in May 2019.

Similarly, more than 103,000 Windows systems also remain vulnerable to SMBGhost, a vulnerability in the Server Message Block v3 (SMB) protocol that ships with recent versions of Windows, disclosed in March 2020.

Both vulnerabilities allow attackers to take over Windows systems remotely and are considered some of the most severe bugs disclosed in Windows over the past few years.

However, despite their severity, many systems have remained unpatched, according to research compiled over the past few weeks by SANS ISC handler Jan Kopriva [1, 2].

Kopriva says that BlueKeep and SMBGhost aren’t the only major remotely-exploitable vulnerabilities that still have a strong presence online these days, exposing systems to attacks.

According to the Czech security researcher, there are still millions of internet-accessible systems that administrators have failed to patch and are vulnerable to remote takeovers. These include systems like IIS servers, Exim email agents, OpenSSL clients, and WordPress sites.

CVEPRODUCTUNPATCHED SYSTEMSCVSSv3
CVE-2019-0211Apache web server3,357,8357.8
CVE-2019-12525Squid1,219,7169.8
CVE-2015-1635Microsoft IIS374,11310
CVE-2019-13917Exim268,4099.8
CVE-2019-10149 (Return of the WIZard)Exim264,6559.8
CVE-2019-0708 (BlueKeep)Windows RDP246,8699.8
CVE-2014-0160 (Heartbleed)OpenSSL204,8787.5
CVE-2020-0796 (SMBGhost)Windows SMB103,00010
CVE-2019-9787WordPress83,9518.8
CVE-2019-12815ProFTPD80,4349.8
CVE-2018-6789Exim76,3449.8

The causes why these systems have been left unpatched remain unknown, but even recent warnings from US government cyber-security agencies have not helped.

This includes two warnings from the US National Security Agency (NSA), one issued in May (for the Exim bug CVE-2019-10149 that was exploited by Russian state hackers), and a second in October (for the BlueKeep bug that was exploited by Chinese state hackers).

Yet, despite these warnings, there are still more than 268,000 Exim servers unpatched for the Exim bug and more than 245,000 unpatched for BlueKeep.

Kopriva says the numbers show that “even very well-known vulnerabilities are sometimes left unpatched for years on end.”

“Given how dangerous and well known BlueKeep is, it rather begs the question of how many other, less well-known critical vulnerabilities are still left unpatched on a similar number of systems,” Kopriva also adds.


Source: Information Technologies - zdnet.com

Aussie BitConnect promoter charged over his involvement with alleged crypto scam

Singapore to pilot common data platform in bid to plug supply chain gaps