Security Experts:

Connect with us

Hi, what are you looking for?



BlueKeep Patching Efforts Sink: 750,000 Systems Still Vulnerable

More than 750,000 systems remain vulnerable to the BlueKeep vulnerability as patching rate has decreased by around 85%, a new report from security firm BitSight reveals. 

More than 750,000 systems remain vulnerable to the BlueKeep vulnerability as patching rate has decreased by around 85%, a new report from security firm BitSight reveals. 

Tracked as CVE-2019-0708, the vulnerability was found to impact Windows Remote Desktop Services (RDS) and to allow an attacker to execute code and take over the vulnerable machine. Malware can abuse the flaw to spread in a manner similar to that of the WannaCry ransomware. 

In May this year, Microsoft released security patches to address the vulnerability in Windows 7, Server 2008, XP and Server 2003, when nearly 1 million systems were found at risk

Now, BitSight reveals that, although initial patching efforts reached approximately 5,244 systems per day, the rate has decreased significantly in July. As of July 23, around 831 systems were being patched each day.

The security firm has observed 788,214 internet-connected systems vulnerable to BlueKeep as of July 23, meaning that around 81% of the exposed vulnerable systems observed at the end of May (namely 972,829 systems) remain unpatched.  

“Unfortunately, we might encounter a situation where the rate of patching tapers off leaving behind a legacy set of systems that remain vulnerable, perhaps unbeknownst to system operators,” BitSight notes. 

Analysis of the vulnerable systems allowed the security firm to “ascertain the operating system with high confidence for 517,654 (53.21%) and 462,923 (58.73%) systems respectively based on attributes of the RDP protocol.”

Thus, BitSight reveals that Windows Server 2008 R2 powers the largest number of affected systems (around 300,000), followed by Windows 7 (around 50,000), Windows Server 2003 (around 40,000), Windows Server 2008 (between 20,000 and 25,000), and Windows Server 2003 R2 (around 20,000). 

Around 10,000 vulnerable systems would run Windows XP, while a small fraction were found to be powered by Windows Vista and embedded versions of Windows 7 and Windows XP. 

Compared to the end of May, systems running server versions of Windows saw the highest patching rate, compared to operating systems associated with workstations, which in some cases show increases in the number of vulnerable systems.  

“We’ve observed the presence of nearly every edition for each Windows family affected. Most interestingly, flavors such as Windows Server 2008 R2 HPC Edition and various Small Business Servers are noticeably present amongst the rest of the editions,” BitSight notes. 

Microsoft also says that it has observed a large number of systems (over 400,000) that have no form of network-level authentication, which puts them potentially at risk from a worm-based weaponization of BlueKeep.

RelatedMicrosoft Warns of New BlueKeep-Like, Wormable RDS Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.