Technology Alert: GNU Bourne-Again Shell (Bash) Vulnerability

September 29, 2014

Technology Alert: GNU Bourne-Again Shell (Bash) Vulnerability

Printable Format:

FIL-49-2014 – PDF (PDF Help)


The FDIC, as a member of the Federal Financial Institutions Examination Council (FFIEC), is issuing the attached alert advising financial institutions of a material security vulnerability with Linux and Unix operating systems that could allow an attacker to gain control of a bank’s servers remotely. The vulnerability is commonly known as the GNU Bourne-Again Shell (Bash) or “Shellshock” vulnerability.

Statement of Applicability to Institutions with Less than $1 Billion in Total Assets: This Financial Institution Letter (FIL) applies to all FDIC-supervised institutions.


  • Bash is a software tool found on operating systems such as Linux and Unix and is used to translate user instructions and other inputs into machine-readable commands.
  • Financial institutions may have Bash present on a wide array of servers and network devices including web servers, email servers, and physical security systems.
  • Exploiting this vulnerability may allow attackers to potentially eavesdrop on encrypted communication, steal login credentials or other sensitive data, impersonate financial institution services or users, access sensitive email, or gain access to internal networks.
  • Financial institutions should assess whether this software is used within their institutions, and implement patches and upgrades following appropriate patch-management practices. Institutions should also monitor the status of their third-party service providers’ and vendors’ efforts to implement patches on software where Bash is present.
  • Examination guidance and additional information on patch management, software maintenance, and security updates can be found in the following FFIEC IT Examination Booklets:

Financial institutions should review U.S. CERT, GNU Bourne- Again Shell (Bash) “Shellshock” Vulnerability (CVE-2014-6271 and CVE-2014-7169) for additional information (see

Leave a comment

Your email address will not be published. Required fields are marked *