IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Over a third of applications have high-risk vulnerabilities

Synopsys report reveals that 97% exhibit some form of vulnerability

Almost all applications have some form of software vulnerability, according to a report published this week by software security company Synopsys. 

Synopsys tests software for its clients, both without any access to the application at all and with valid user credentials. It ran 3,900 software tests on 2,600 target applications and systems and found 97% exhibiting some form of vulnerability

More than a third of the vulnerabilities were high-risk, allowing attackers to access application resources and data, said Synopsys' “2021 Software Vulnerability Snapshot” report. It also found 6% were critical, meaning that they would allow attackers to access sensitive information. 

The most common high-risk vulnerability was cross-site scripting, at 28%, followed by a failure to rate-limit login attempts, which renders the application open to brute force attacks. 

The top critical vulnerabilities stemmed from SQL injection attacks, which allow attackers to manipulate the back-end database by inserting SQL commands into the application interface. These vulnerabilities have existed since the early days of web applications and frequently make the OWASP Top 10, which is a list of the most common security flaws found in web applications and is updated roughly every four years. 

The vulnerabilities found in the report mapped closely to those detailed in the 2021 edition of the OWASP Top 10. Three in four matched those on the OWASP list. 

Related Resource

2021 Thales cloud security study

The challenges of cloud data protection and access management in a hybrid and multi cloud world

Blonde woman in professional clothing writing on a board Free download

Synopsys warned that even lower-risk vulnerabilities can be dangerous. "For example, verbose server banners — found in 49% of the tests — provide critical information such as server name, type, and version number that could allow attackers to perform targeted attacks on specific technology stacks," it said. 

The report, which ran analysis, including penetration tests and static analysis, made some recommendations to help companies avoid the fallout from attacks. It advised them to implement content security policies protecting against attacks that could access data in the application without authorization. It found missing or inadequate policies in 77% of the tests. 

The report also recommended a software bill of materials to detail third-party libraries used in applications and assess their security. Almost one in five tests revealed applications using vulnerable third-party libraries.

Featured Resources

The Total Economic Impact™ Of Turbonomic Application Resource Management for IBM Cloud® Paks

Business benefits and cost savings enabled by IBM Turbonomic Application Resource Management

Free Download

The Total Economic Impact™ of IBM Watson Assistant

Cost savings and business benefits enabled by Watson Assistant

Free Download

The field guide to application modernisation

Moving forward with your enterprise application portfolio

Free Download

AI for customer service

Discover the industry-leading AI platform that customers and employees want to use

Free Download

Recommended

Cyber resiliency and end-user performance
Whitepaper

Cyber resiliency and end-user performance

17 Aug 2022
Can't choose between public and private cloud? You don't have to with IaaS
Whitepaper

Can't choose between public and private cloud? You don't have to with IaaS

12 Aug 2022
What is zero trust?
network security

What is zero trust?

14 Jul 2022
Retbleed hardware-level flaw brings overhead woe to Intel and AMD
Hardware

Retbleed hardware-level flaw brings overhead woe to Intel and AMD

13 Jul 2022

Most Popular

Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022
UK water supplier confirms hack by Cl0p ransomware gang
ransomware

UK water supplier confirms hack by Cl0p ransomware gang

16 Aug 2022