A debate over actual exploitation is muddying response efforts. Multiple researchers say they’ve observed working proof of concepts while others assert evidence of attacks is lacking.
The open-source code library is one of the most extensively used application frameworks. Wiz found vulnerable versions in around 39% of cloud environments.
Researchers aren’t aware of any active exploitation of the software, but the issue is being dealt with simultaneously as attackers are trying to brute force the company’s…
Sen. Mark Warner, D-Va., speaks during a press conference in Washington, D.C., on March 20, 2018. From left, Sens. John Cornyn, James Lankford, Susan Collins and Richard Burr listen. (NICHOLAS KAMM/AFP via Getty Images)
Rep. Deborah Ross, D-N.C., speaks during a press conference in Washington, D.C., on June 3, 2024. Legislation from Ross and two colleagues to add AI systems to the National Vulnerability Database cleared a House panel on Sept. 25, 2024. (Photo by ALLISON BAILEY/Middle East Images/AFP via Getty Images)