Despite a great start, the rate of patching OpenSSL servers against the critical Heartbleed vulnerability has slowed down to almost a halt. Around 300,000 servers remain vulnerable and many of them are unlikely to get patched anytime soon.Over the past month only around 9,000 servers were secured, a far cry from the almost 300,000 servers patched during the first month after the vulnerability was revealed.The Heartbleed flaw was publicly disclosed in early April and allows attackers to extract information from the memory of servers that run OpenSSL 1.0.1 through 1.0.1f, if they support an SSL feature called “heartbeat.” The extracted information can include user passwords and long-term server private keys that can be used to decrypt SSL traffic captured from servers.Shortly after the vulnerability was announced, Robert Graham, the CEO of Errata Security, ran an Internet scan and found 615,268 publicly accessible SSL servers that were vulnerable to Heartbleed. He repeated the scan one month later and found that the number of vulnerable systems had decreased by almost half, to 318,239. The impressive patching rate was also reflected in the results of other tests. Immediately after the flaw was made public, Ivan Ristic, who runs a monthly scan of the Internet’s top 155,000 SSL-enabled sites as part of the SSL Pulse project, estimated that up to 30 percent of those sites might be vulnerable. A month later the SSL Pulse data was showing that only 1,291 sites, or 0.8 percent of the total, were still vulnerable to Heartbleed, leading Ristic to describe the Heartbleed patching effort as “incredibly fast” in a recent email.However, it doesn’t seem there has been a lot of progress since early May. “Last night, now slightly over two months after Heartbleed, we scanned again, and found 300k (309,197) still vulnerable,” Graham said Saturday in a blog post. “This indicates people have stopped even trying to patch. “Since the SSL Pulse scan results for June show only 1,044 sites vulnerable to Heartbleed, the almost 310,000 vulnerable servers found by Graham are likely hosting less popular sites not covered by the project. And if those servers haven’t been patched until now, despite significant efforts to raise awareness about this vulnerability on the Internet, it’s likely many of them will remain vulnerable for some time to come.“Even a decade from now, though, I still expect to find thousands of systems, including critical ones, still vulnerable,” Graham said.The researcher plans to decrease the frequency of his scans in the future. The next scan will be performed in a month, then in six months and then yearly after that, he said. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe