Researcher finds over 300,000 servers still Heartbleed-vulnerable

Jun 23, 2014 by Nancy Owano weblog
Credit: Victorgrigas/Wikideia/ CC BY-SA 3.0

Back in April, discoveries made headlines over a vulnerability in OpenSSL known as Heartbleed. The flaw in OpenSSL, a software library for the protection and security of websites, was uncovered and reported it to the OpenSSL team, triggering widespread awareness and advice on what steps administrators and Web users can take. In June, one can well ask, how are we doing? The answer, according to a security expert tracking the issue, is that many servers remain unpatched and vulnerable. Over half the Heartbleed vulnerable servers are still exposed; at least 309,197 servers are still vulnerable to the exploit; they run unpatched.

Robert Graham, researcher of Errata Security, released those numbers in a blog on Saturday. At the time of the Heartbleed announcement in April, he said there were 600,000 systems vulnerable to Heartbleed. In May, he found that half had been patched; 300,000 were vulnerable. "Last night, now slightly over two months after Heartbleed, we scanned again, and found 300k (309,197) still vulnerable. This is done by simply scanning on port 443, I haven't check [sic] other ports."

Those numbers indicated to Graham that "people have stopped even trying to patch. We should see a slow decrease over the next decade as older systems are slowly replaced. Even a decade from now, though, I still expect to find thousands of systems, including critical ones, still vulnerable." He said he will scan again in July and also at the six-month mark, then yearly, to track progress.

Following the news of Heartbleed in April, users generally were told that as a safety measure they might choose to use a different password everywhere instead of a blanket password for numerous sites they access and to avoid older, less maintained sites that may not have patched Heartbleed. System administrators were advised to update versions of SSL and to revoke compromised keys and reissue new keys.

Placing the Heartbleed events in perspective, Greg Kumparak, mobile editor at TechCrunch, said on Sunday that "There's a really good reason why security researchers were so spooked by the Heartbleed bug: there's just no silver bullet. Even if we somehow banded together to get most of the world's systems patched, a big chunk of the Internet would likely be left vulnerable. Sure enough, Heartbleed beats on."

Explore further: OrangeSec pair said Cortana visited Android

More information:

Related Stories

What you need to know about the Heartbleed bug

Apr 09, 2014

Millions of passwords, credit card numbers and other personal information may be at risk as a result of a major breakdown in Internet security revealed earlier this week.

Heartbleed bug find triggers OpenSSL security advisory

Apr 08, 2014

A flaw called Heartbleed in OpenSSL, which is a software library used for the protection and security of millions of websites, was uncovered by Neel Mehta of Google Security, who first reported it to the ...

Recommended for you

OrangeSec pair said Cortana visited Android

6 hours ago

Can, did, Cortana work on Android? A talked-about act at droidcon 2015: a presentation titled "Cracking Cortana." The OrangeSec team arrived at the Turin, Italy, event to show their work in a CortanaProxy ...

Report: Trusted Voice option rolling out for some

Apr 15, 2015

Smart Lock is arguably the best new feature in Android Lollipop, wrote Droid Life founder "Kellex" in March. With a secure lock screen set, he said, the user gets a number of options in Smart Lock to keep the phone or tablet quickly unlockable w ...

Redirect to SMB vulnerability in Windows discovered

Apr 14, 2015

News stories on tech spots on Monday reported that the Irvine, California, security company Cylance's SPEAR research team discovered a vulnerability relating to all versions of Windows including the Windows ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

5 / 5 (1) Jun 23, 2014
I don't know how one might goad these intransigent web site operators into fixing their sites. Maybe search engines like Google should derank their pages or include a warning in search results. As a user of Google's search engine, I would certainly find such an action helpful.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.