• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

Alarming rise of codebases containing high-risk open-source vulnerabilities logged

FutureCISO Editors by FutureCISO Editors
March 13, 2024
Photo by Tima Miroshnichenko: https://www.pexels.com/photo/person-in-black-hoodie-hacking-a-computer-system-5380651/

Photo by Tima Miroshnichenko: https://www.pexels.com/photo/person-in-black-hoodie-hacking-a-computer-system-5380651/

Share on FacebookShare on Twitter

Nearly three-quarters of commercial codebases assessed for risk contain open-source components impacted by high-risk vulnerabilities, according to the Open Source Security and Risk Analysis” (OSSRA) report by Synopsys, Inc. 

Alarming rise

Economic instability, the layoffs of tech workers, and decreasing number of resources available to patch vulnerabilities may contribute to the sharp increase of codebases with high-risk open-source vulnerabilities from 48% in 2022 to 74% in 2023.

Jason Schmitt

“The increasing pressure on software teams to move faster and do more with less in 2023 has likely contributed to this sharp rise in open-source vulnerabilities. Malicious actors have taken note of this attack vector, so maintaining proper software hygiene by identifying, tracking, and managing open-source effectively is a key element to strengthening the security of the software supply chain,” said Jason Schmitt, general manager of Synopsys Software Integrity Group.

Additional key findings 

The study also revealed that 91% of codebases contained outdated components by ten or more versions. Around 49% of codebases had zero development activity components within the past two years. 

Moreover, the study found that some codebases contained open-source license conflicts (53%) and were using code with either no discernible license or a customised license (31%). 

The researchers also observed that eight of the top 10 vulnerabilities trace back to one common weakness type classified as Improper Neutralisation weaknesses (CWE-707), which includes the various forms of cross-site scripting. 

Related:  100% of CISOs in SG only receive more support after an attack
Tags: codebasescybersecurityopen-source vulnerabilitiesSynopsys
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses
  • Weak password reuse crisis remains

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl