• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Bigger than Heartbleed? Shellshock Bug Puts UNIX Systems at Risk

Is it time for Heartbleed to step aside? There’s a new bug in town and it’s monopolized the tech world’s focus as of late. But is it all it’s cracked up to be?

Shellshock has been making headlines, some of which have touted it as being bigger and badder than the Heartbleed flaw that came to light this past spring. Plenty of companies are still working to defend themselves against Heartbleed, so this news isn’t exactly music to IT’s ears.

The Shellshock bug is a vulnerability in Bash, a command shell used in many Linux and UNIX operating systems, as well as Apple’s Mac OS X. Under a certain set of circumstances, attackers might be able to assign their own variables to a command shell, getting it to execute their commands and giving them the ability to run malware, access personal information, etc.

It seems that Shellshock presents a dangerous mix of a severe problem that could also be relatively easy for hackers to utilize, according to the National Vulnerability Database. It’s given the vulnerability a 10 out of 10 in both exploitability and impact.

There’s also some indication that the Shellshock bug has existed for years, potentially even decades. That kind of longevity makes it likely security pros won’t be able to track down and cover every single vulnerability.

Believe the hype?

Even though the problem has a fairly wide scope and has an impressive lifespan, things might not be as dire as first thought. For one thing, just running Bash doesn’t automatically make you vulnerable. A specific set of factors needs to be in place in order for Bash to be remotely accessed.

And hackers may need to take a slightly different course of action to access vulnerable code depending on the device they’re attempting to take over. So even though the bug may be easy to exploit on a one-off basis, exploiting it on a widespread scale might not be such a walk in the park.

Meanwhile, Apple has said the vast majority of people using its software should be in the clear. Only users who’ve configured their machines for advanced UNIX services could be vulnerable, and Apple recently released a patch for those users.

Keeping your systems secure

Other software updates have been released, but there is some question as to whether they’ve fully addressed the problem. Still, for IT pros whose systems might be exposed, the best defense right now is to make sure you’re company’s machines are running the latest version of Bash that’s available.

It’s a good idea to begin to inventory your systems that run Linux or UNIX to see which ones have Bash installed and therefore could be at risk. Be sure to keep your eyes peeled for embedded systems running Bash, i.e., load balancers, which can sometimes fly under the radar.

There’s also another weak spot that needs to be addressed: end-users. Whenever a story like this breaks, it can bring with it a number of phishing attempts as hackers try to exploit people’s fears and bait them into clicking on malicious links. So it couldn’t hurt to remind everyone of the usual security best practices, that way IT teams don’t end up with a whole new problem to worry about. 

Arraya Solutions partners with leading security firm, BTB Security. In response to Shellshock, they’ve offered to perform remote scans to ID systems and services for vulnerabilities at no cost. This can give IT teams some assurance they aren’t leaving missing any critical exposures.

To take advantage of this offer, reach out to your Arraya Account Manager today or email us here.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}