Despite the fact that Microsoft stopped support for Windows XP and Server 2003, these operating systems still used by many. In mid-may, the Corporation released the patch that should close the gap for WannaCry or similar viruses in the old OS. However, until now, many systems remain unprotected. The specialists believe that the exploits for the vulnerability BlueKeep exist separately from WannaCry.
It is important to note that a PC running these operating systems still is part of the critical infrastructure and enterprise environments. About replacing them speech does not go yet for a number of reasons.
During the release of the patch against the RDP CVE-2019-0708 (BlueKeep) in the company finessed. It was stated that the gap allows you to spread the viruses between PCs by analogy with WannaCry, and that it was related to a component of the remote Windows desktop. While Windows 8 and 10 were completely protected from such attacks.
However, now there is information from the same Microsoft that exploits for BlueKeep is in “the wild”. This theoretically allows you to attack any PC with Windows XP and Server 2003 to install unauthorized software to run viruses, ransomware, and so on. Researchers at security noted that the development of this exploit is not a problem, although not published code to avoid leaks.
At the moment it is recommended to install update for old OS or upgrade to more modern versions of Windows, to avoid even the possibility of invasion from the outside. According to security experts, today about million PCs connected to the Internet and contain the vulnerability BlueKeep. And considering that it may be network gateways, the number of potentially vulnerable points can be a lot more.
Recall that for Windows XP and Server 2003 require a manual update. For Windows 7 and newer systems, it is downloaded automatically.