An exploit specifically targeting corporate CA users has been created some three weeks after a critical vulnerability affecting the products was identified.
The attack uses an ActiveX Control buffer overflow vulnerability present in 21 CA products, including Unicentre Remote Control, Software Delivery, Asset Management, Desktop Management Bundle and Desktop Management Suite.
The exploit was rated as critical by the French Security Incident Response Team (FSIRT), which discovered the vulnerability, and allows hackers to launch local and remote attacks such as a denial of service (DoS) or a hijack of the affected system.
Thompson Cyber Security Labs director, and consultant to AVG, Rodger Thompson, who discovered the hack, said attacks will become widespread because of the popularity of the exploit's NeoSploit toolkit delivery system.
"The vulnerability is likely to be quite widespread, simply because of CA's size and spread within the corporate market," Thompson said in his blog.
"Corporate clients should probably be pretty nervous, because their firewall is unlikely to protect them against this."
FSIRT claimed the buffer overflow error occurs in the ListCtrl.ocx ActiveX Control when handling overly long arguments passed to the 'AddColumn()' method. This can be exploited by remote attackers to execute arbitrary code by tricking users into visiting a malicious Web page.
AVG marketing manager Lloyd Borrett said the exploit will become widespread because corporate IT has a reluctance to push out patches.
"The big problem is the corporate world has a lot of people in standard operating environments, and there is a culture for IT to take a long time to roll out updates," Borrett said.
The company has issued a patch which will rectify the vulnerabilities across affected products.
CA was unavailable for comment at the time of publication.