Synopsys Study Underscores Need for Comprehensive SBOM as Best Defense in Software Supply Chain Security
Synopsys, Inc. (NASDAQ: SNPS) has released the 2023 Open Source Security and Risk Analysis (OSSRA) report, indicating a troubling rise in known open source vulnerabilities. The report reveals that 84% of codebases contain at least one known vulnerability, marking a nearly 4% increase from last year. The growth in open source usage has surged by 13%, with an average of 595 open source components per audit. A significant 91% of audited codebases had outdated open source components, while 31% were found using components without licenses, raising legal risks. This highlights the critical need for organizations to implement a Software Bill of Materials (SBOM) to mitigate risks in their software supply chain.
- Increase in average open source components per audit rose by 13%, from 528 to 595.
- Open source usage has expanded across multiple sectors, including a 163% increase in EdTech.
- 84% of codebases contain at least one known open source vulnerability, a 4% increase from last year.
- High-risk vulnerabilities have increased significantly, with a 557% rise in Retail and eCommerce since 2019.
- 91% of audited codebases had outdated open source components.
- 31% of codebases used open source components without discernable licenses, posing legal risks.
The findings of the 2023 OSSRA report deliver an in-depth look at the current state of open source security, compliance, licensing, and code quality risks in commercial software with the goal of helping security, legal, risk, and development teams better understand the open source security and license risk landscape. This year's findings revealed an overwhelming majority of codebases (
The first step toward reducing business risk from open source, proprietary, and commercial code involves a comprehensive inventory of all software a business uses, regardless of where it comes from or how it's acquired. Only with this complete inventory – a Software Bill of Materials (SBOM) – can organizations establish a strategy to address risk stemming from new security disclosures like Log4Shell.
"The 2023 OSSRA report findings underscore the reality of open source as the underlying foundation of most types of software built today," said Jason Schmitt, general manager of the
Key findings from the 2023 OSSRA report include:
- A five-year overview of OSSRA data shows dramatic growth in open source use: The global pandemic contributed to the EdTech sector's adoption of open source, which grew by
163% , with educational courses and instructor/student interactions increasingly pushed online. Other sectors experiencing a large spike in open source growth include the Aerospace, Aviation, Automotive, Transportation and Logistics sector with a97% increase and74% growth in Manufacturing and Robotics. - High-risk vulnerabilities over the past five years have also increased at an alarming rate: Since 2019, high-risk vulnerabilities in the Retail and eCommerce sector jumped by
557% . Comparatively, the Internet of Things (IoT) sector, with89% of the total code being open source, saw a130% increase in high-risk vulnerabilities in the same period. Similarly, the Aerospace, Aviation, Automotive, Transportation and Logistics vertical was found to have a232% increase in high-risk vulnerabilities. - Use of open source components with no licenses puts organizations at greater risk of violating copyright law than those using licensed components: The report found that
31% of codebases are using open source with no discernable license or with customized licenses. This is a55% increase from last year's OSSRA report. The lack of a license associated with open source code, or a variant of another open source license, may place undesirable requirements on the licensee and will often require legal evaluation for possible IP issues or other legal implications. - Available code quality and security patches are not applied to a majority of codebases: Of the 1,480 audited codebases that included risk assessments,
91% contained outdated versions of open source components. Unless an organization keeps an accurate and up to date SBOM, an outdated component can be forgotten until it becomes vulnerable to a high-risk exploit.
"The key to managing open source risk at the speed of modern development is maintaining complete visibility of application contents," said
To learn more about the 2023 OSSRA findings, download a copy of the report, read the blog post, or register for the
About the
About
Editorial Contact:
Liz Samet
336-414-6753
esamet@synopsys.com
View original content:https://www.prnewswire.com/news-releases/synopsys-study-underscores-need-for-comprehensive-sbom-as-best-defense-in-software-supply-chain-security-301752848.html
SOURCE
FAQ
What were the main findings in the 2023 OSSRA report released by Synopsys on February 22, 2023?
How has the use of open source components changed according to the latest OSSRA report?
What is a Software Bill of Materials (SBOM) and why is it important according to Synopsys?