The Cupertino, Calif. based Symantec reported heightened traffic on Port 2967, used for communication when running the solution, although only in the .edu domain, typically more prone to attacks than more security-minded enterprises. Weafer said Symantec has received reports from 10 colleges that are seeing an increased amount of port scans.
"It's not a major event," Weafer told SCMagazine.com today. "It really looks like it's localised."
But researcher Joel Esler of the SANS Internet Storm Center said his organisation has received reports of a "massive new outbreak of bots" exploiting the Symantec vulnerability. Weafer downplayed that claim, saying that because attackers are scanning a well-defined port, sensors are more prominently picking up the threat.
The Symantec Security Response blog suggested that customers apply the patch, available since May 25, to plug the hole. Users also are encouraged to employ the latest security updates for their products.
"We know somebody is out there," Weafer said. "This is a good reminder that people to patch their systems, particularly small businesses."
Should organisations be unable to apply the fixes, they should block Port 2967 at their firewall, according to Symantec's blog. The company said it will continue to investigate.
Click here to email Dan Kaplan.