SAN FRANCISCO — Cybersecurity professionals who track down bugs discovered, created a fix for, and told the industry about the vulnerability that allowed attackers into the Equifax network two months before the company was hit by hackers.
"The Equifax data compromise was due to (Equifax') failure to install the security updates provided in a timely manner," The Apache Foundation, which oversees the widely-used open source software, said in a statement Thursday.
Equifax told USA TODAY late Wednesday that the criminals who potentially gained access to the personal data of up to 143 million Americans had exploited a website application vulnerability known as Apache Struts CVE-2017-5638.
The vulnerability was patched on 7 March 2017, the same day it was announced, the foundation said. First modifications were made on March 10, according to the National Vulnerability Database.
Equifax said that the unauthorized access began in mid-May. That's a period of two months in which the company could have, and should have, say experts, dealt with the problem.
"We continue to work with law enforcement as part of our criminal investigation, and have shared indicators of compromise with law enforcement," Equifax said.
The initial report of the security vulnerability says that a company using the software needed only to upgrade to a more recent version of the Apache Struts program. It is a framework for web servers that help companies, including many Fortune 500 corporations, take in and serve up data.
"Equifax has been intensely investigating the scope of the intrusion with the assistance of a leading, independent cybersecurity firm to determine what information was accessed and who has been impacted," the company said late Wednesday.
The company also indicated that it had not yet had determined the full impact of the breach.
Experts say the information potentially stolen by the hackers, including Social Security numbers, dates of birth and names, could put people at risk of identity theft for the rest of their lives.
Equifax CEO Richard F. Smith apologized Tuesday in a USA TODAY op-ed and said that the company initially "thought the intrusion was limited" after discovering it on July 29.
The company offered consumers free credit monitoring and identity theft insurance.
"We are devoting extraordinary resources to make sure this kind of incident doesn’t happen again," Smith said. "We will make changes and continue to strengthen our defenses against cyber crimes."
The researchers who found the vulnerability identified Wednesday by Equifax as the cause of the breach had prepared two plugins that could be used as a drop-in solution, which they posted online.
To be sure, the process of patching the flaw isn’t as simple as just downloading a new version of Java. It requires searching the company’s entire portfolio of applications to look for known and newly-reported vulnerabilities, then updating to the latest version of those applications. It is then often necessary to rewrite the applications so they match the other software the company is using. Then everything must be retested and redeployed.
It can take time, even for large corporations with dedicated security staff, which Equifax presumably had, noted Jeff Williams, co-founder of Contrast Security. Williams identified a different Struts vulnerability earlier this year.
Still, not doing so is “absolutely unreasonable,” he said. “This is not some crazy movie-plot attack scenario. There is really no excuse for organizations not to be prepared for this totally expected scenario. They should have a well-practiced playbook and run it often.”
Follow USA TODAY reporter Nathan Bomey on Twitter @NathanBomey and Elizabeth Weise @eweise.