A critical flaw in a widely-used software poses potential risks for the entire internet, according to a CNN report that quoted concerns raised by cybersecurity experts.
The report, published on Wednesday, also mentioned that experts have raised alarms and big companies have taken initiatives to fix the vulnerability on the software.
The flaw was reported late last week is in Java-based software known as ‘Log4j’ that large organisations use to configure their applications, the report said.
Security researchers told CNN that Apple's cloud computing service, security firm Cloudflare, and one of the world's most popular video games, Minecraft, are among the many services that run Log4j.
“Jen Easterly, head of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA), called it "one of the most serious flaws" seen in her career,” the report noted.
Easterly said in a statement on Saturday that "a growing set" of hackers are actively attempting to exploit the vulnerability.
“As of Tuesday, more than 100 hacking attempts were occurring per minute,” CNN said citing recent data from cybersecurity firm Check Point.
"It will take years to address this while attackers will be looking... on a daily basis [to exploit it]," said David Kennedy, CEO of cybersecurity firm TrustedSec. "This is a ticking time bomb for companies."
According to CNN, “Log4j is one of the most popular logging libraries used online, according to cybersecurity experts. Log4j gives software developers a way to build a record of activity to be used for a variety of purposes, such as troubleshooting, auditing and data tracking. Because it is both open-source and free, the library essentially touches every part of the internet.”
"It's ubiquitous. Even if you're a developer who doesn't use Log4j directly, you might still be running the vulnerable code because one of the open-source libraries you use depends on Log4j," Chris Eng, chief research officer at cybersecurity firm Veracode, told CNN Business. "This is the nature of software: It turtles all the way down."
“Companies such as Apple, IBM, Oracle, Cisco, Google and Amazon, all run the software. It could present in popular apps and websites, and hundreds of millions of devices around the world that access these services could be exposed to the vulnerability,” the report said.
“Attackers appear to have had more than a week's head start on exploiting the software flaw before it was publicly disclosed, according to cybersecurity firm Cloudflare. Now, with such a high number of hacking attempts happening each day, some worry the worst is to yet come,” CNN said in the report.
"Sophisticated, more senior threat actors will figure out a way to really weaponize the vulnerability to get the biggest gain," Mark Ostrowski, Check Point's head of engineering, said Tuesday.
“Late Tuesday, Microsoft said in an update to a blog post that state-backed hackers from China, Iran, North Korea and Turkey have tried to exploit the Log4j flaw,” CNN noted.
“Experts are especially concerned about the vulnerability because hackers can gain easy access to a company's computer server, giving them entry into other parts of a network. It's also very hard to find the vulnerability or see if a system has already been compromised,” the report said citing Kennedy.
“In addition, the second vulnerability in Log4j's system was found late Tuesday. Apache Software Foundation, a nonprofit that developed Log4j and other open-source software, has released a security fix for organisations to apply,” the news agency said.
“Last week, Minecraft published a blog post announcing a vulnerability was discovered in a version of its game -- and quickly issued a fix. Other companies have taken similar steps,” the report said.
“IBM, Oracle, AWS and Cloudflare have all issued advisories to customers, with some pushing security updates or outlining their plans for possible patches,” it added.
"This is such a severe bug, but it's not like you can hit a button to patch it like a traditional major vulnerability. It's going to require a lot of time and effort," Kennedy was quoted as saying the report.
“For transparency and to help cut down on misinformation, CISA said it would set up a public website with updates on what software products were affected by the vulnerability and how hackers exploited them,” the report said.