Veracode report finds Open Source Components proliferating digital risk

Veracode report finds Open Source Components proliferating digital risk

Year-over-year improvements in the code organisations write – but increasing proliferation of risk from open source and third party component use

Key Findings:

• Prevalent use of open-source and third-party components creating unmanaged risk: Approximately 97 percent of Java applications contained at least one component with a known vulnerability.

• Challenges still exists: 60% of applications fail security policies upon first scan

• Best practices emerge, but not pervasive: The top quartile of companies fix almost 70% more vulnerabilities than the average company

• Giving developers more power improves security: Developers using sandbox technology to scan apps prior to assurance testing show 2x improvement in fix rates

• Training matters: Best practices like remediation coaching and eLearning can improve vulnerability fix rates by as much as 6x

• Web applications are still fragile: More than half of web applications were affected by misconfigured secure communications or other security defenses

• DevOps is taking hold: Some applications being scanned multiple times per day, average security tests per app is seven, with some apps being scanned 600-700 times

Veracode released the findings in its annual State of Software Security Report (SoSS). The seventh edition of the report presents metrics drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months.

The report revealed that the continued and persistent use of components in software development is creating systemic risk in our digital infrastructure. However, the report also found that companies achieve accelerated benefits when their application security programmes reach maturity.

These finding indicate that the growing trend of focusing on digital risk at the application layer and building security into DevOps processes (DevSecOps) can yield great results for organisations in reducing risk without slowing down software development.

Veracode’s analysis revealed the growing risk caused by the proliferation of vulnerable open source components. Veracode found that a single popular component with a critical vulnerability spread to more than 80,000 other software components, which were in turn then used in the development of potentially millions of software programmes. Approximately 97 percent of Java applications contained at least one component with a known vulnerability.

Brian Fitzgerald, CMO, Veracode said:

“The prevalent use of open source components in software development is creating unmanaged, systemic risks across companies and industries. Today, a cybercriminal can focus on a single vulnerability in one component to exploit millions of applications. Software components are used by every industry and for software of all kinds, and given our dependence on applications, the ease at millions of applications can be breached has the potential to create havoc in our digital infrastructure and economy.”

Veracode’s research also highlights the challenges that still exist in software development more broadly. For example, 60 percent of applications failed basic security requirements upon first scan. However, the report found that when companies follow best practices and implement programmes with consistent policies and practices for secure development, they are able to remediate vulnerabilities at a higher rate. The study showed that the top quartile of companies fix almost 70 percent more vulnerabilities than the average organisation. Additionally, best practices like remediation coaching and eLearning can improve vulnerability fix rates by as much as six-times. Developers who test unofficially using Developer Sandbox scanning improve policy-based vulnerability fix rates by about two-times.

Chris Wysopal, co-founder and CTO, Veracode said:

“The ability to frequently test applications is going to be crucial to the success of secure development initiatives at companies with continuous development and deployment models like those found in DevOps environments. Our platform data shows that more companies are starting to test applications multiple times throughout the development lifecycle. The average number of security tests per app was seven, and some apps were scanned 700-800 times in an 18-month period. We are encouraged by this information because it suggests companies are more deeply embedding security into their software development processes.”

Veracode’s annual State of Software Security Report also examines the prevalence of vulnerable open source components in applications, compared industry trends regarding the fixing and finding of vulnerabilities, and security trends pointing to the rise of DevOps environments, such as some applications being scanned multiple times per day, average security tests per app is seven.

To read the full report, click here!

[su_button url=”https://www.veracode.com/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]Click here to find out more about Veracode[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Product Spotlight - HID

Product Spotlight – HID

Access control is evolving into a smart, responsive platform—integrating embedded apps, IoT, and cybersecurity to deliver…
Genetec

Genetec brings new capabilities to Security Center SaaS

Genetec announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service (SaaS) solution..
I-Pro

i-PRO Launches Revamped EMEA Partner Program

i-PRO announced a major expansion of its EMEA Partner Program. The move supports i-PRO’s long-term growth strategy and…
ASIs international

ASIS International Introduces New ANSI-Approved Investigations Standard

ASIS International, a leading authority in security standards, is excited to announce the release of its revised American National Standards.
Gallagher Security and Yusuf Bin Ahmed Kanoo Company Limited sign MOU in Riyadh

Gallagher Security MOU with Yusuf Bin Ahmed Kanoo Company

Gallagher Security is proud to announce the signing of a Memorandum of Understanding (MOU) with Yusuf Bin Ahmed Kanoo Company…
Mike Hurst - Security Buyer

Zygal appoints Mike Hurst CPP CPOI

Zygal, which produces cutting edge AI cloud VMS and monitoring solutions for connecting, managing, and monitoring assets…
Secure Logiq

Secure Logiq expands into APAC

Secure Logiq is heading into the Asia-Pacific region with big plans and a clear focus on Australia and New Zealand. Helping to steer…
Sophos

Sophos Enhances Protection and Incident Response

Sophos announces an update to its Sophos Firewall, now including Sophos NDR Essential, which is free for all customers with an…
Dallmeier

Tenerife Airport relies on video technology

Tenerife Norte-Ciudad de La Laguna Airporthas significantly improved its safety by installing state-of-the-art video technology..
ICT

ICT announces Stewart Meyer as Chief Marketing Officer

Integrated Control Technology (ICT®), a leading provider of intelligent access control, intrusion detection, building automation and…
Scroll to Top