Skip to main content

The top 25 weaknesses in software in 2024

MITRE recently released its yearly list of the 2024 CWE Top 25 Most Dangerous Software Weaknesses

This list differs from lists that contain the most common vulnerabilities, as it is not a list of vulnerabilities, but rather weaknesses in system design that can be exploited to leverage vulnerabilities. 

“By definition, code injection is an attack, and when we think about the Top 25 it’s identifying the weaknesses underneath,” said Alec Summers, project leader for the CVE Program at MITRE. 

These weaknesses can potentially pave the way for vulnerabilities and attacks, so it’s important to be aware of them and mitigate them as much as possible.

According to Summers, one trend in this year’s list is that while some weaknesses moved up or down the list, a lot of the weaknesses on the list are classic weaknesses that have been around for years, such as those that enable SQL injection and cross-site scripting.

“The more you understand these weaknesses, and you draw connections between these things, you can actually start to eliminate whole classes of problems that we see so many times,” he said.

Addressing these weaknesses not only improves product security, but also has the potential to save companies money because “the more weaknesses we avoid in product development, the less vulnerabilities to manage after deployment,” he explained.

This year’s list includes the following weaknesses:

  1. Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
  2. Out-of-bounds Write
  3. Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
  4. Cross-Site Request Forgery (CSRF)
  5. Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
  6. Out-of-bounds Read
  7. Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
  8. Use After Free
  9. Missing Authorization
  10. Unrestricted Upload of File with Dangerous Type
  11. Improper Control of Generation of Code (‘Code Injection’)
  12. Improper Input Validation
  13. Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
  14. Improper Authentication
  15. Improper Privilege Management
  16. Deserialization of Untrusted Data
  17. Exposure of Sensitive Information to an Unauthorized Actor
  18. Incorrect Authorization
  19. Server-Side Request Forgery (SSRF)
  20. Improper Restriction of Operations within the Bounds of a Memory Buffer
  21. NULL Pointer Dereference
  22. Use of Hard-coded Credentials
  23. Integer Overflow or Wraparound
  24. Uncontrolled Resource Consumption
  25. Missing Authentication for Critical Function

The dataset the list is based on includes records for 31,779 Common Vulnerabilities and Exposures (CVEs) published between June 1, 2023 and June 1, 2024. 

According to Summers, this year, the method in which the list was created was different than in past years because MITRE and CISA involved the broader security community to analyze the dataset, whereas in previous years MITRE’s Common Weakness Enumeration (CWE) team worked alone. 

This may have resulted in many changes from previous years, and this year’s list only featured three weaknesses that retained the same ranking as last year: #3 Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’), #10 Unrestricted Upload of File with Dangerous Type, and #19 Server-Side Request Forgery (SSRF).

The weaknesses that had the biggest upward move from last year’s list are #4 Cross-Site Request Forgery, which moved up five ranks; #11 Improper Control of Generation of Code (‘Code Injection’), which moved up 12 ranks; #15 Improper Privilege Management, which moved up seven ranks; and #18 Incorrect Authorization, which moved up six ranks. 

Weaknesses that moved down in rank significantly include #12 Improper Input Validation, which moved down six ranks; #21 NULL Pointer Dereference, which moved down nine ranks; #23 Integer Overflow or Wraparound, which moved down nine ranks; and #25 Missing Authentication for Critical Function, which moved down five ranks. 

This year also saw two new entries to the list and two entries that left the Top 25. New entries include #17 Exposure of Sensitive Information to an Unauthorized Actor and #24 Uncontrolled Resource Consumption. Previous entries no longer in the Top 25 are Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’) and Incorrect Default Permissions.

According to MITRE, one possible cause of the changes is that they did not receive CWE mappings from the U.S. National Vulnerability Database analysts for the CVE records from the first half of 2024. 

“It is not clear whether these gaps affect the relative rankings, since the distribution of unmapped CVEs seems likely to align roughly with the CWE distribution of the entire data set,” MITRE wrote

The post The top 25 weaknesses in software in 2024 appeared first on SD Times.



from SD Times https://ift.tt/k8lUFoj

Comments

Popular posts from this blog

Difference between Web Designer and Web Developer Neeraj Mishra The Crazy Programmer

Have you ever wondered about the distinctions between web developers’ and web designers’ duties and obligations? You’re not alone! Many people have trouble distinguishing between these two. Although they collaborate to publish new websites on the internet, web developers and web designers play very different roles. To put these job possibilities into perspective, consider the construction of a house. To create a vision for the house, including the visual components, the space planning and layout, the materials, and the overall appearance and sense of the space, you need an architect. That said, to translate an idea into a building, you need construction professionals to take those architectural drawings and put them into practice. Image Source In a similar vein, web development and design work together to create websites. Let’s examine the major responsibilities and distinctions between web developers and web designers. Let’s get going, shall we? What Does a Web Designer Do?...

A guide to data integration tools

CData Software is a leader in data access and connectivity solutions. It specializes in the development of data drivers and data access technologies for real-time access to online or on-premise applications, databases and web APIs. The company is focused on bringing data connectivity capabilities natively into tools organizations already use. It also features ETL/ELT solutions, enterprise connectors, and data visualization. Matillion ’s data transformation software empowers customers to extract data from a wide number of sources, load it into their chosen cloud data warehouse (CDW) and transform that data from its siloed source state, into analytics-ready insights – prepared for advanced analytics, machine learning, and artificial intelligence use cases. Only Matillion is purpose-built for Snowflake, Amazon Redshift, Google BigQuery, and Microsoft Azure, enabling businesses to achieve new levels of simplicity, speed, scale, and savings. Trusted by companies of all sizes to meet...

2022: The year of hybrid work

Remote work was once considered a luxury to many, but in 2020, it became a necessity for a large portion of the workforce, as the scary and unknown COVID-19 virus sickened and even took the lives of so many people around the world.  Some workers were able to thrive in a remote setting, while others felt isolated and struggled to keep up a balance between their work and home lives. Last year saw the availability of life-saving vaccines, so companies were able to start having the conversation about what to do next. Should they keep everyone remote? Should they go back to working in the office full time? Or should they do something in between? Enter hybrid work, which offers a mix of the two. A Fall 2021 study conducted by Google revealed that over 75% of survey respondents expect hybrid work to become a standard practice within their organization within the next three years.  Thus, two years after the world abruptly shifted to widespread adoption of remote work, we are dec...