BlueKeep

BlueKeep Description

Microsoft is always releasing new versions for its operating system. However, many users all around the world still using old versions of its operating systems even though they supposedly do not have support from Microsoft. However, due to a flaw that was discovered recently and affects still supported but old operating systems such as Windows Server 2008, Windows 7 and Windows Server 2008R2, Microsoft released a new security update to patch this flaw, (CVE-2019-0708 or BlueKeep. The BlueKeep, according to Microsoft, can be used to give power to a threat as damaging as the WannaCry Ransomware that caused a lot of problems in 2017.

The BlueKeep vulnerability was found in a built-in component present in Remote Desktop Services of supported versions, also was found in machines running Windows 2003 and Windows XP. The BlueKeep is threatening because it is pre-authentication and doesn't need the user's participation, acting like a worm, which makes it an easy-to-exploit vulnerability that malware makers can include into their creations.

Although there are no reports of attacks exploiting the Blue Keep vulnerability, computer users running Windows 10, Windows 8.1, Windows 8, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2 and Windows Server 2012 can be affected in the case of an attack.

One of the main recommendations from security specialists is to keep your software always up-to-date. Following this simple and easy recommendation, computer users can avoid numerous serious problems. Also, the presence of updated security software on a computer is another strong recommendation from the experts.

Leave a Reply

Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.


HTML is not allowed.