Experts say hackers are taking advantage of a vulnerability in a widely used software tool, then accessing computer systems and servers without a password.