The new BlueKeep security vulnerability that attacked older versions of Windows in May affected about a million devices. BlueKeep not only attacks Windows 7 but also affects Windows 2003, Windows XP, Windows Server 2008 and Windows Server 2008 R2. Soon Microsoft released a patch for all Windows versions affected by BlueKeep. But one has not yet updated the patch and is in danger of being attacked by the BlueKeep vulnerability. The following article will show you how to fix security holes on old Windows versions.
Instructions to fix BlueKeep error on Windows
Security vulnerability BlueKeep uses remote computer control protocol - Remote Desktop Protocol (RDP) of Windows to remotely access users' computers. This vulnerability allows pre-authentication and does not require user interaction for hackers to execute code on the computer system. Once they have access to the computer, they will view, change, delete all data.
First of all, users need to check if their computer is vulnerable to this security vulnerability. We download rdpscan tool according to the link below.
https://github.com/robertdavidgraham/rdpscan/releases
Step 1:
We download the patches in the 2 links below and then proceed with the installation. Windows Update mode on the computer fades to turn on.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708
Step 2:
Next we proceed to disable RDP and block port 3389. To disable RDP you open CMD on the Admin computer, then enter the command below.
Reg add 'computernameHKLM SYSTEMCurentControlSetControlTerminal Server' /v fDenyTSConnections /t REG_DWORD /d 1 /f
Click the following command to block port 3389
netsh advfirewall firewall add rule dir=in action=block protocol=TCP localport=3389 name="Block_TCP-3389"
I wish you all success!
ncG1vNJzZmismaXArq3KnmWcp51ktbDDjK2mZp6ZrXqjuNSeop6doGLApq%2FUq6CtsV2av7O70WadqKpdrLavsM6wqmZqYGWAbsPIp5uor6NixbF51qKlnaenqHp4edaipZ2np6h6tLHRr5yrZWJlfXk%3D