Security News
pnpm 10.0.0 Blocks Lifecycle Scripts by Default
pnpm 10 blocks lifecycle scripts by default to improve security, addressing supply chain attack risks but sparking debate over compatibility and workflow changes.
Security News
Sarah Gooding
November 22, 2024
MITRE has published its annual 2024 CWE Top 25 Most Dangerous Software Weaknesses list, which highlights the most critical and prevalent software vulnerabilities. CWE (Common Weakness Enumeration) is a community-developed list of common weaknesses in software and hardware that can introduce vulnerabilities.
This year’s report is based on a new methodology with a scoring approach that results in the following:
MITRE reported that the updated methodology resulted in many ranking changes from last year, with only three weaknesses retaining the same ranking. Essentially, this ranking is better able to deliver both the nastiest and most common vulnerabilities in software today.
These are the flaws that pose the greatest risk due to their prevalence, potential for exploitation, and severity of impact when exploited. The updated methodology focuses on highlighting weaknesses that are both common and capable of causing significant harm, ensuring the list reflects real-world threats developers and organizations need to address most urgently.
The top three weaknesses are dominated by input validation issues. These include Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79), Out-of-bounds Write (CWE-787), and Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (CWE-89).
XSS remains a pervasive issue because of its prevalence in web applications and the wide range of potential impacts. Out-of-bounds write weaknesses are a major contributor to severe vulnerabilities like buffer overflows, which have been exploited in both modern and legacy systems. SQL injection remains a top vulnerability year after year due to the ease with which it can be exploited.
A few other highlights and changes from the previous year include several weaknesses that have jumped in rankings. A handful have fallen to lower positions in the rankings, potentially due to improvements in the adoption of memory-safe programming languages like Rust:
MITRE attributes some of the shifts in rankings to incomplete mapping from the NVD. Many CVE Records for 2024 did not receive CWE mappings from National Vulnerability Database (NVD) analysts. This reduced dataset may have influenced rankings, as fewer CVE Records were considered for certain CWEs:
For example, the number of CVE Records that were mapped to CWE-787: Out-of-bounds Write declined by over 2,000 this year. It is not clear whether these gaps affect the relative rankings, since the distribution of unmapped CVEs seems likely to align roughly with the CWE distribution of the entire data set.
MITRE also cites the introduction of the new methodology contributing to changes in the top 25 of the 900 weaknesses in the CWE. The updated methodology emphasizes the frequency and severity of vulnerabilities, leading to shifts in rankings. This change ensures that the list reflects the most impactful and prevalent weaknesses rather than theoretical or less critical ones.
The 2024 CWE Top 25 list highlights the enduring challenges of input validation, where application-layer weaknesses like XSS and SQL Injection are still far from becoming a thing of the past. The list serves as a resource for understanding the most pressing security vulnerabilities and prioritizing mitigation based on the impact of exploitation.
Subscribe to our newsletter
Get notified when we publish new security blog posts!
Try it now
Security News
pnpm 10 blocks lifecycle scripts by default to improve security, addressing supply chain attack risks but sparking debate over compatibility and workflow changes.
Product
Socket now supports uv.lock files to ensure consistent, secure dependency resolution for Python projects and enhance supply chain security.
Research
Security News
Socket researchers have discovered multiple malicious npm packages targeting Solana private keys, abusing Gmail to exfiltrate the data and drain Solana wallets.