News & Analysis

More than 95% Apps are Vulnerable 

The annual Synopsys Research says a quarter of these vulnerabilities are impacted by critical or high-risk challenges

A new report by Synopsys, a global major in EDA and semiconductors, suggests that close to 95% of all applications contained some sort of vulnerability, with a fifth of them bearing high-risk ones and another 5% containing critical vulnerabilities. The outcome was inferred through a series of 4,300 security tests conducted on 2,700 software targets that include web apps, mobile apps, source code files and network systems. 

In a statement, Synopsis Inc says a majority of these security tests were intrusive “black box” or “gray box”tests that included penetration testing, dynamic application security testing and mobile application security testing designed to probe running applications as a real-world attacker would. 

It said 82% of the test targets were web applications or systems, 13% were mobile applications, and the remainder were either source code or network systems/applications. Industries represented in the tests included software and internet, financial services, business services, manufacturing, consumer services, and healthcare.

In the 4,300 tests conducted, 95% of the targets were found to have some form of vulnerability (a 2% decrease from last year’s findings). Twenty percent of the targets had high-risk vulnerabilities (a 10% decrease from last year), and 4.5% had critical vulnerabilities (a 1.5% decrease from last year). 

The results demonstrate that the best approach to security testing is to utilize the wide spectrum of tools available including static analysis, dynamic analysis, and software composition analysis to help ensure an application or system is free from vulnerabilities. 

For example, 22% of the total test targets had some exposure to a cross-site scripting (XSS) vulnerability, one of the most prevalent and destructive high-/critical-risk vulnerabilities impacting web applications. Many XSS vulnerabilities occur when the application is running. The good news is that the exposure identified in this year’s findings were 6% lower than last year’s findings—meaning that organizations are taking proactive measures to mitigate XSS vulnerabilities in their production applications.

“This research underscores that intrusive black box testing techniques like DAST and pen testing are particularly effective for surfacing exploitable vulnerabilities in the software development lifecycle and should be part of any well-rounded application security testing regimen,” said Girish Janardhanudu, vice president, security consulting at Synopsys Software Integrity Group. 

The report also presented some additional insights as follows: 

  • OWASP Top 10 vulnerabilities were discovered in 77% of the targets. Application and server misconfigurations were 18% of the overall vulnerabilities found in the tests (a 3% decrease from last year’s findings), represented by the OWASP A05:2021 – Security Misconfiguration category. And 18% of the total vulnerabilities found were related to the OWASP A01:2021 – Broken Access Control category (a 1% decrease from last year).
  • The urgent need for a software Bill of Materials. Vulnerable third-party libraries were found in 21% of the penetration tests conducted (an increase of 3% over last year’s findings). This corresponds with the 2021 OWASP Top 10 category A06:2021—Use of Vulnerable and Outdated Components. Most organizations use a mix of custom-built code, commercial off-the-shelf code, and open source components to create the software they sell or use internally. Often those organizations have informal—or no—inventories detailing exactly what components their software is using, as well as those components’ licenses, versions, and patch status. With many companies having hundreds of applications or software systems in use, each themselves likely having hundreds to thousands of different third-party and open source components, an accurate, up-to-date software Bill of Materials is urgently needed to effectively track those components. is urgently needed to effectively track those components.
  • Lower-risk vulnerabilities can also be exploited to facilitate attacks. Seventy-two percent of the vulnerabilities discovered in the tests are considered low- or medium-risk. That is, the issues found are not directly exploitable by attackers to gain access to systems or sensitive data. Nonetheless, resurfacing these vulnerabilities isn’t an empty exercise, as even lower-risk vulnerabilities can be exploited to facilitate attacks. For example, verbose server banners—found in 49% of the DAST tests and 42% of the pen tests—provide information such as server name, type, and version number that could allow attackers to perform targeted attacks on specific technology stacks.

Synopsys Software Integrity Group provides integrated solutions that transform the way development teams build and deliver software, accelerating innovation while addressing business risk. Our industry-leading portfolio of software security products and services is the most comprehensive in the world and interoperates with third-party and open source tools, allowing organizations to leverage existing investments to build the security program that’s best for them. Only Synopsys offers everything you need to build trust in your software. 

Leave a Response