When the Heartbleed bug was disclosed on Monday, the attention focused on the fallout for major Internet companies like Yahoo and Amazon. But security experts said the potential for harm could extend much further, to the guts of the Internet and the many devices that connect to it.
By Thursday, some of the companies that make those devices began revealing whether they had been affected.
Cisco Systems, the dominant provider of gear to move traffic through the Internet, said its big routers and servers, as well as its online servers — a big business — were not affected. If they had been, that would have had a significant im! pact on virtually every major company that connects to the Internet.
Certain products the company makes were affected, it said — some kinds of phones that connect to the Internet, a kind of server that helps people conduct online meetings, and another kind of device used for office communications. Cisco also posted a list of products it had examined for the vulnerability, which it was updating as it continued inspecting its equipment.
A Cisco rival, Juniper Networks, also said its main products were not affected. The only problem it found was in a kind of device for creating private communications on the Internet.
"Besides one product, t! he exposure for our customers is minimal, if any," said Mich! ael Busselen, vice president of corporate communications at Juniper.
Chuck Malloy, a spokesman for Intel, said his company had been looking through its products for vulnerabilities for several days and so far had found nothing. He said, however, that the search was not yet done.
Qualcomm, a maker of mobile technology, said it was still checking its products.
The Heartbleed flaw was found in the method known as OpenSSL that helps encrypt information on the Internet.
For most people, the web — with sites like Facebook and Google �! � is the most visible part of the Internet. But hardware like home routers and printers is also connected to the Internet, and OpenSSL is built into some of this hardware.
"That's why this is so nasty," said George Kurtz, chief executive of CrowdStrike, a security firm. "OpenSSL goes far beyond just websites. It's implemented in email protocols and all kinds of embedded devices."
Most of the equipment made by Cisco and Juniper was unaffected because the companies did not use OpenSSL for their encryption.
Security experts say personal home routers often incorporate OpenSSL, which could make them vulnerable. But they note that beca! use many home routers are configured to block outside traffic, the risk! of a hacker using the Heartbleed bug to lift data like passwords to online banking and email accounts is low. This is particularly so, they said, when there are still thousands of vulnerable websites where this data could be pulled from much more easily.
Nevertheless, Mr. Kurtz said, users would be wise to check with their home router manufacturers to upgrade their devices if they want to be absolutely secure.
Security researchers say that while hackers have been posting lists of vulnerable websites, there does not appear to have been an increase in black market sales of sensitive data, like passwords.
Security experts say that upgrading an! d cleaning up those systems, if they are affected, could take years.
"It's one thing to get all of these servers at Yahoo, Google and everyone else fixed, but it's a whole other thing to get these embedded devices fixed up," Mr. Kurtz said. "I don't see them getting updated any time soon."
Source : http://www.nytimes.com/2014/04/11/business/security-flaw-could-reach-beyond-websites-to-digital-devices-experts-say.html?partner%3Drss%26emc%3Drss