BlueKeep, the Threat that Continues to Affect Thousands of Users

BlueKeep has been and continues to be one of the most important vulnerabilities that has affected Windows in recent years. Keep in mind that Microsoft‘s operating system is the most used in desktop computers. This means that many users can be harmed. The problem is that, a year and a half after appearing, it continues to affect hundreds of thousands of users.

BlueKeep continues to affect thousands of Windows users

As we say, thousands of Windows operating system users continue to have their computers vulnerable to BlueKeep . Specifically, it is estimated that there are more than 245,000 systems that are. This is a significant problem and the reason is none other than the fact that users have not installed the necessary patches.

BlueKeep

It should be borne in mind that when this problem appeared in May 2019, a first scan to analyze the computers susceptible to this type of attack revealed about 950,000 . This means that even today approximately 25% of that amount still does not correct the problem.

We can say that BlueeKeep is a security flaw that affects Windows software in old, unpatched versions. It attacks the Remote Desktop Protocol and this allows you to connect with another computer through the network. This allows malware to pass from one computer to another and spread quickly.

This means that users must protect themselves adequately. We already saw in an article how to know if the computer is vulnerable to BlueKeep.

Luckily, protecting ourselves from this vulnerability is very simple. Basically what you have to do is make sure we have the latest version of Windows installed, with all the corresponding patches . It is the only way to know that we are really protected and that a potential attacker is not going to take advantage of the BlueKeep vulnerability.

BlueKeep vulnerabilidad RDP

Not only BlueKeep, the SMBGhost vulnerability is very present

But unfortunately not only the BlueKeep vulnerability still affects thousands of Windows users. Also worth mentioning is the SMBGhost issue , a bug that affects the Server Message Block v3 protocol.

This flaw is more recent, having been revealed in March 2020. It also allows an attacker to take control remotely and is just as important. Again the problem is that many users still do not correct this vulnerability.

An estimated 103,000 computers are currently vulnerable to SMBGhost. It is very important that users install the corresponding patches and have the equipment updated to the latest version in order to avoid this problem.

It should be noted that there are more vulnerabilities that remain unpatched in Windows. These are the two main ones when we talk about remote access, but there are others that can also put our security at risk.

From this article we recommend always installing the latest versions and patches available. We are not only talking about the operating system level, but about whatever program we are using. There are many vulnerabilities that can appear and that in one way or another could compromise privacy and security.