Software updates and data transfers are essential to modern applications, but failing to validate their integrity can have catastrophic consequences, as the recently added “Software and Data Integrity Failures” category in the OWASP Top 10 demonstrates. This post explores why this new category matters and the staggering impacts inadequate integrity checks have already caused.
CWEs Mapped | 10 |
Max Incidence Rate | 16.67% |
Avg Incidence Rate | 2.05% |
Avg Weighted Exploit | 6.94 |
Avg Weighted Impact | 7.94 |
Max Coverage | 75.04% |
Avg Coverage | 45.35% |
Total Occurrences | 47,972 |
Total CVEs | 1,152 |
A08:2021 – Software and Data Integrity Failures
When software updates itself or incorporates external code and data, integrity checks validate that the incoming code or data has not been tampered with or corrupted. Without these checks, malicious actors can distribute compromised updates, as in the devastating SolarWinds hack.
This new OWASP category includes failures to verify software updates, CI/CD dependencies, and deserialized data. Though it currently maps to only 10 common weakness enumerations (CWEs), these CWEs appear in approximately 2% of applications tested and have the category’s highest aggregate impact score at 7.94 out of 10. As software supply chain attacks increase, the significance of this category will only grow.
The SolarWinds attack alone impacted 18,000 organizations by distributing compromised software updates. Attributed to Russian hackers Cozy Bear, downstream costs are still accumulating and now average around $12 million per affected organization – 11% of annual revenue.
Another common failure is deserializing untrusted data (CWE-502). When deserialized outside expected use cases, this can enable remote code execution attacks.
Overall, the 10 CWEs in this category were identified in nearly 50,000 tested applications. As software permeates infrastructure and daily life, the potential scale of such attacks will only increase.
Thankfully, OWASP provides useful resources to avoid these failures, including cheat sheets on cryptographic storage and secure DevOps practices.
When incorporating external dependencies in CI/CD pipelines or downloads, hash checks validate the integrity of imported code and data. Enforcing code signatures on software updates can prevent execution of altered binaries.
For deserialized data, integrity checks require an understanding expected data formats and sources. Risk analysis should identify critical serialization points and safeguards against unexpected inputs.
Increasing integration of third-party code and frequent updates drive modern software velocity but require thoughtful integrity checks to avoid potentially staggering impacts. By learning from past failures and applying OWASP’s guidance, development teams can release secure, resilient software without compromising speed or efficiency.
Focusing on integrity protections makes applications safer for end-users and businesses alike – a worthwhile investment as software takes a growing role in global systems and infrastructure.
We hope this post helped in learn about OWASP's Top #7 application security risk Software and Data Integrity Failures. Thanks for reading this post. Please share this post and help secure the digital world. Visit our website, thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive updates like this.
You may also like these articles:
Rajeshwari KA is a Software Architect who has worked on full-stack development, Software Design, and Architecture for small and large-scale mission-critical applications in her 18 + years of experience.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.