Hackers are already leveraging these over-permissioned programs to access the IT systems of major security vendors.
Moreover, many of the vulnerable apps are under active exploitation. About 20% of exposed instances contained artifacts ...