Common security flaws leave applications open to amateur hackers, security report says
The software industry's inability to reduce the number of security flaws in its code is fueling an age of the "everyday hacker," criminals who can exploit vulnerabilities with a minimum of technical skills, Security testing firm Vercode's latest State of Software Security (SoSS) report suggests.
Of the 22,430 applications submitted to the firm's code analysis service in an 18-month period ending June 2012, only 13 percent of web applications were able to pass the generic OWASP Top 10 list of security problems.
When it came to standalone applications, only 31 percent complied with the separate CWE/SANS Top 25, a significant decrease on the compliance rate in the previous SoSS report caused, Veracode suggested, by a broader sample of companies using the service.
Nevertheless, the percentage of applications containing common but serious flaws such as SQL injection remained static at 32 percent, with cross-site scripting also stubbornly entrenched at 67 percent.
In short, these failure rates underscore that weak and insecure software development lifecycles are still an issue years after the industry was supposed to have started fixing the problem. Dataq breaches were an inevitable consequence.
Expect SQL injection attacks
And having failed to eradicate issues such as SQL injection, the ability of non-technical hackers to hunt down and exploit them also augured badly for the industry, Veracode said.
The company predicts that around one in three data breaches during 2013 will be caused by SQL injection alone, one of the easiest for "everyday hackers" to target.
"The pessimist remains very concerned that we are not seeing the dramatic decreases in exploitable coding flaws that I expect to see with each passing year," said Veracode's co-founder and CTO, Chris Wysopal in his introduction to the report.
"It's as if for each customer, development team, or application that has become more secure, there are an equal number or more that do not," he added. "Put more bluntly, we must figure out a way to code more securely simply to keep up with attacks from the most basic attacker."
The effect of failures in the SDL on the security professional and CISOs is open to some debate although Veracode claims that the average length of tenure could now be as low as 18 months. Is this an effect of data breaches, and therefore code insecurity? That's not clear.