MITRE just lately launched its yearly checklist of the 2024 CWE High 25 Most Harmful Software program Weaknesses.
This checklist differs from lists that include the most typical vulnerabilities, as it isn’t a listing of vulnerabilities, however relatively weaknesses in system design that may be exploited to leverage vulnerabilities.
“By definition, code injection is an assault, and after we take into consideration the High 25 it’s figuring out the weaknesses beneath,” stated Alec Summers, venture chief for the CVE and CWE applications at MITRE.
These weaknesses can probably pave the way in which for vulnerabilities and assaults, so it’s vital to concentrate on them and mitigate them as a lot as attainable.
In line with Summers, one pattern on this yr’s checklist is that whereas some weaknesses moved up or down the checklist, a variety of the weaknesses on the checklist are traditional weaknesses which have been round for years, similar to those who allow SQL injection and cross-site scripting.
“The extra you perceive these weaknesses, and also you draw connections between these items, you possibly can truly begin to eradicate entire courses of issues that we see so many instances,” he stated.
Addressing these weaknesses not solely improves product safety, but additionally has the potential to save lots of corporations cash as a result of “the extra weaknesses we keep away from in product growth, the much less vulnerabilities to handle after deployment,” he defined.
This yr’s checklist consists of the next weaknesses:
- Improper Neutralization of Enter Throughout Internet Web page Era (‘Cross-site Scripting’)
- Out-of-bounds Write
- Improper Neutralization of Particular Components utilized in an SQL Command (‘SQL Injection’)
- Cross-Web site Request Forgery (CSRF)
- Improper Limitation of a Pathname to a Restricted Listing (‘Path Traversal’)
- Out-of-bounds Learn
- Improper Neutralization of Particular Components utilized in an OS Command (‘OS Command Injection’)
- Use After Free
- Lacking Authorization
- Unrestricted Add of File with Harmful Kind
- Improper Management of Era of Code (‘Code Injection’)
- Improper Enter Validation
- Improper Neutralization of Particular Components utilized in a Command (‘Command Injection’)
- Improper Authentication
- Improper Privilege Administration
- Deserialization of Untrusted Information
- Publicity of Delicate Info to an Unauthorized Actor
- Incorrect Authorization
- Server-Facet Request Forgery (SSRF)
- Improper Restriction of Operations throughout the Bounds of a Reminiscence Buffer
- NULL Pointer Dereference
- Use of Onerous-coded Credentials
- Integer Overflow or Wraparound
- Uncontrolled Useful resource Consumption
- Lacking Authentication for Essential Perform
The dataset the checklist is predicated on consists of information for 31,779 Frequent Vulnerabilities and Exposures (CVEs) revealed between June 1, 2023 and June 1, 2024.
In line with Summers, this yr, the methodology during which the checklist was created was totally different than in previous years as a result of MITRE and CISA concerned the broader safety neighborhood to research the dataset, whereas in earlier years MITRE’s Frequent Weak spot Enumeration (CWE) staff labored alone.
This will likely have resulted in lots of modifications from earlier years, and this yr’s checklist solely featured three weaknesses that retained the identical rating as final yr: #3 Improper Neutralization of Particular Components utilized in an SQL Command (‘SQL Injection’), #10 Unrestricted Add of File with Harmful Kind, and #19 Server-Facet Request Forgery (SSRF).
The weaknesses that had the most important upward transfer from final yr’s checklist are #4 Cross-Web site Request Forgery, which moved up 5 ranks; #11 Improper Management of Era of Code (‘Code Injection’), which moved up 12 ranks; #15 Improper Privilege Administration, which moved up seven ranks; and #18 Incorrect Authorization, which moved up six ranks.
Weaknesses that moved down in rank considerably embody #12 Improper Enter Validation, which moved down six ranks; #21 NULL Pointer Dereference, which moved down 9 ranks; #23 Integer Overflow or Wraparound, which moved down 9 ranks; and #25 Lacking Authentication for Essential Perform, which moved down 5 ranks.
This yr additionally noticed two new entries to the checklist and two entries that left the High 25. New entries embody #17 Publicity of Delicate Info to an Unauthorized Actor and #24 Uncontrolled Useful resource Consumption. Earlier entries not within the High 25 are Concurrent Execution utilizing Shared Useful resource with Improper Synchronization (‘Race Situation’) and Incorrect Default Permissions.
In line with MITRE, one attainable reason behind the modifications is that they didn’t obtain CWE mappings from the U.S. Nationwide Vulnerability Database analysts for the CVE information from the primary half of 2024.
“It’s not clear whether or not these gaps have an effect on the relative rankings, because the distribution of unmapped CVEs appears more likely to align roughly with the CWE distribution of the complete knowledge set,” MITRE wrote.