JFrog Software Supply Chain Report Shows Most Critical Vulnerabilities Scores Are Misleading
74% with High or Critical CVSS scores weren’t applicable in most common cases, but 60% of security and development teams still spend a quarter of their time remediating vulnerabilities
This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20240319775900/en/
JFrog Software Supply Chain State of the Union Report 2024 (Graphic: JFrog)
“DevSecOps teams worldwide are navigating a volatile field of software security, where innovation frequently meets demand in an age of rapid AI adoption,” said
Key Findings
JFrog’s Software Supply Chain State of the Union report combines JFrog Artifactory developer usage data amongst 7K+ organizations, original CVE analysis by the
-
Not all CVEs are what they seem
—
Traditional CVSS ratings look purely at the severity of the exploit as opposed to the likelihood it will be exploited, which requires context to make an effective assessment.
The JFrog Security Research team downgraded the severity of 85% of Critical CVEs and 73% of High CVEs on average after analyzing 212 different high-profile CVEs discovered in 2023. Additionally, JFrog found that 74% of the reported common CVEs with High and Critical CVSS scores on the top 100 Docker Hub community images weren’t exploitable. -
Denial of Service (DoS) attacks reig
n
— Of the 212 high-profile CVEs analyzed by the
JFrog Security Research team, 44% of them held the potential for a DoS attack vs. 17% with the potential to perform Remote Code Execution (RCE). This is good news for security organizations in the sense that RCE has a far more detrimental impact vs. DoS attacks due to their ability to offer full access to backend systems. - Security taking a toll on productivity — Forty percent of survey respondents said it typically takes a week or longer to get approval to use a new package/library, extending time to market for new apps and software updates. Additionally, approximately 25% of security teams’ time is spent remediating vulnerabilities, even when those vulnerabilities may be overrated or even non-exploitable given their current context.
-
Applying security checks is inconsistent across the software development lifecycle (SLDC) — The industry seems to be split pretty evenly down the middle when it comes to deciding where to apply application security testing across the software development lifecycle, underscoring the importance of shifting left and right simultaneously. Forty-two percent of developers claim it’s best to perform security scans during code writing while 41% say it’s best to perform scans on new software packages before bringing them into your organization from an
Open-Source Software (OSS) repository. - Security tool sprawl continues — Nearly half of IT professionals (47%) say they use between four and nine application security solutions. However, a third of survey respondents and security professionals (33%) say they’re using 10 or more application security solutions. This supports a market-wide trend of needing security tooling consolidation with a movement away from point solutions.
- Disproportionate use of AI/ML tools for security — While 90% of survey respondents indicate their organization currently uses AI/ML-powered tools in some capacity to assist in security scanning and remediation efforts, only one in three professionals (32%) claim their organization uses AI/ML-powered tools to write code, indicating the majority are still wary of the potential vulnerabilities GenAI-developed code can introduce to enterprise software.
“Vulnerabilities are growing in number year over year, but that does not necessarily mean they are growing in severity. It’s clear that IT teams are willing to invest in new tools to bolster their security, but knowing where to put those tools, use their team’s time, and streamline processes is critical to keeping their SDLC secure,” said
For deeper insights from the JFrog Software Supply Chain State of the Union 2024 download the full report. You can also register to join JFrog security and developer experts on
Like this Story? Share this: @JFrog shares research findings in their annual Software Supply Chain State of the Union 2024 report. Discover the emerging #DevSecOps trends, risks & best practices to securing enterprise #SoftwareSupplyChain. Learn more: https://jfrog.co/3TzsVNg #SoftwareSupplyChain #DevOps #DevSecOps #cybersecurity #containers #CVE
About JFrog
Cautionary Note About Forward-Looking Statements
This press release contains “forward-looking” statements, as that term is defined under the
These forward-looking statements are based on our current assumptions, expectations and beliefs and are subject to substantial risks, uncertainties, assumptions and changes in circumstances that may cause JFrog’s actual results, performance or achievements to differ materially from those expressed or implied in any forward-looking statement. There are a significant number of factors that could cause actual results, performance or achievements, to differ materially from statements made in this press release, including but not limited to risks detailed in our filings with the
View source version on businesswire.com: https://www.businesswire.com/news/home/20240319775900/en/
Media Contact:
Investor Contact:
Source: