/oct 19, 2022

MANUFACTURING OVERTAKES FINANCIAL SERVICES AS THE SECTOR WITH FEWEST SOFTWARE SECURITY FLAWS

72 percent of applications contain vulnerabilities, and 12 percent are considered 'high severity' – the lowest of all industries analyzed

Sector still has room for improvement, with some of the lowest and slowest fix rates, especially for open-source flaws 

BURLINGTON, Mass. – October 19, 2022 – Veracode, a leading global provider of application security testing solutions, today revealed that the manufacturing sector has the lowest number of software security flaws, dethroning financial services which took first place last year. The data was published in the company’s annual State of Software Security (SoSS) report v12, which analyzed 20 million scans across half a million applications in the manufacturing, healthcare, financial services, technology, retail, and government sectors.

While the industry grappled with increased pressure and demand on the supply chain, manufacturing emerged as the most-targeted industry by cybercriminals in 2021, with vulnerability exploitation identified as the top initial attack vector*. Securing the software supply chain has, therefore, never been a greater priority since mandates like the US Executive Order on Cybersecurity and the EU Cyber Resilience Act put the issue firmly in the spotlight.

Chris Eng, Chief Research Officer at Veracode, said, “It’s encouraging to see flaw reduction over the past year as manufacturing organizations continue to make software security a priority—especially since technological innovation has led to the increased adoption of new platforms and environments. Last year, we found 76 percent of manufacturing apps contained flaws, with 21 percent considered ‘high severity’. These figures have decreased considerably.”

Open-source Security Flaws Stick Around for Longer

Despite the positive results in terms of flaw prevalence, Veracode’s research revealed the manufacturing sector—alongside healthcare and technology—has the lowest proportion of flaws that are fixed once they’re discovered. More alarming is the amount of time taken to remediate flaws—manufacturing industries post among the slowest timeframes for flaws discovered by static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA). For example, around 55 percent of flaws discovered by static analysis remain unfixed after one year, and the manufacturing sector consistently lags behind the overall average by four months.

Flaws in third-party libraries found through SCA stick around longer for all industries, with 30 percent of vulnerable libraries remining unresolved after two years. For the manufacturing sector, that statistic rises to over 40 percent, lagging the cross-industry average by more than six months.

Eng said, “This may be influenced by a larger number of specialized, industrial applications that have fewer, but harder to fix, flaws than in other industries. These results amplify the need for manufacturers to focus on addressing flaws in a timely fashion.”

Some Flaws Are More Common Than Others

The research also dived into flaw type across programming languages used by applications in the manufacturing sector, including Java, .NET, and JavaScript. Veracode’s research examined the types of flaws affecting applications, and found that server configuration, insecure dependencies, and information leakage are among the most common discovered in the manufacturing sector.

Eng closed, “The safety of businesses and critical infrastructure is largely dependent on the software supply chain being secure and this can only be achieved by having visibility of its components. Integrating security early in the software development lifecycle and leveraging tools to generate a Software Bill of Materials (SBOM) will provide manufacturers with assurance that the products they place in the market have fewer vulnerabilities and, therefore, less risk.”  

The Veracode State of Software Security v12 manufacturing snapshot is available to download here and the full report is available here.

-END-

* IBM Security, “X-Force Threat Intelligence Index”, February 2022

About the State of Software Security Report

The Veracode State of Software Security (SoSS) v12 analyzed the full historical data from Veracode services and customers. This accounts for a total of more than half a million applications (592,720) that used all scan types, more than a million dynamic analysis scans (1,034,855), more than five million static analysis scans (5,137,882) and more than 18 million software composition analysis scans (18,473,203). All those scans produced 42 million raw static findings, 3.5 million raw dynamic findings, and six million raw SCA findings.

The data represents large and small companies, commercial software suppliers, software outsourcers, and open-source projects. In most analyses, an application was counted only once, even if it was submitted multiple times as vulnerabilities were remediated, and new versions uploaded.  


About Veracode

Veracode is a leading AppSec partner for creating secure software, reducing the risk of security breach, and increasing security and development teams’ productivity. As a result, companies using Veracode can move their business, and the world, forward. With its combination of process automation, integrations, speed, and responsiveness, Veracode helps companies get accurate and reliable results to focus their efforts on fixing, not just finding, potential vulnerabilities. Learn more at www.veracode.com, on the Veracode blog and on Twitter.

Copyright © 2022 Veracode, Inc. All rights reserved. All other brand names, product names, or trademarks belong to their respective holders.

 

Press and Media Contacts

Veracode:
Katy Gwilliam,
Head of Global PR, Veracode
[email protected]
+44.7584.341.110
Related Links
veracode.com


BROWSE RESOURCES


  • resource image

    Analyst
    Reports

  • resource image

    Blogs

  • resource image

    Customer
    Stories

  • resource image

    Demos

  • resource image

    News

  • resource image

    Research

  • resource image

    Tips
    and Tricks

  • resource image

    Webinars,
    Videos,
    & Podcasts

  • resource image

    Whitepapers
    and eBooks