The US government has warned that it believes hackers are trying to make use of the Heartbleed bug.
The Department of Homeland Security advised the public to change passwords for sites affected by the flaw once they had confirmed they were secure.
However, an official added that there had not been any reported attacks or malicious incidents.
The alert comes as several makers of net hardware and software revealed some of their products had been compromised.
Affected equipment includes network routers and switches, video conferencing kit, phone call software, firewalls and apps that let workers remotely access company data.
The encryption flaw can potentially be exploited to steal passwords and secret keys used to protect computer users.
Experts say home kit is less at risk.
There had been reports that domestic home networking equipment – such as wi-fi routers – might also make use of unpatched versions of the OpenSSL cryptographic library used to digitally scramble sensitive data.
However, a security researcher at the University of Cambridge’s Computer Laboratory said he thought this would be a relatively rare occurrence.
“You would have to be a semi-professional to have this sort of equipment at home,” Dr Richard Clayton told the BBC.
“It’s unusual to find secure connections to a home router because you’d have to have a certificate in the device.
“If that certificate were self-signed it would generate browser warnings. Alternatively, you could be regularly updated but that would cost money.”
UK internet service providers (ISPs) Sky, TalkTalk and Virgin Media confirmed that their home router suppliers had told them their equipment did not use OpenSSL.
News of the Heartbleed bug emerged on Monday when Google Security and Codenomicon – a Finnish security company – revealed that a flaw had existed in OpenSSL for more than two years.
This had made it possible to impersonate services and users, and potentially eavesdrop on data communications.
The flaw only exposed 64K of data at a time, but a malicious party could theoretically make repeated grabs until they had the information they wanted.
The website set up to publicise the danger noted that it was possible to carry out such an attack “without leaving a trace”, making it impossible to know for sure if criminals or cyberspies had taken advantage of it.
Media reports initially focused on the risk of logging into compromised online services such as webmail, cloud storage and banking, with some – but not all – companies suggesting users should reset their passwords.
Warnings from companies including Cisco,Juniper, Fortinet, Red Hat and Watchguard Technologies that some of their internet products are compromised may now place the spotlight on the corporate sector.
Dr Clayton explained how such a hacker could take advantage of the problem.
“If you managed to log into a router then the simplest thing you could do would be to change the DNS [domain name system] settings in there,” he said.
“Then you could arrange that everything on the internet resolves correctly apart from, for example, Barclays.com, which you could set to resolve to a malicious site that asks for the visitors’ details.”
The UK has given similar advice.
“People should take advice on changing passwords from the websites they use,” said a Cabinet Office spokesman.
“Most websites have corrected the bug and are best placed to advise what action, if any, people need to take.”