Vulnerability

Vulnerable & Outdated Dependencies
detect, understand, remediate

Using libraries and frameworks with known vulnerabilities is one of the most common security risks. Attackers actively exploit published CVEs in outdated dependencies.

No credit card required. Free plan available forever.

Severity

High

CWE ID

CWE-1035

OWASP Top 10

A06:2021 – Vulnerable and Outdated Components

CVSS 3.1 Score

8.1

What are vulnerable dependencies?

Vulnerable dependencies are third-party libraries, frameworks, and packages used in an application that contain known security vulnerabilities (CVEs). Modern applications rely on hundreds or thousands of dependencies, and each one represents a potential entry point for attackers if it contains unpatched security flaws.

The software supply chain has become a primary attack vector. When a widely-used library like Log4j, OpenSSL, or a popular npm package is found to have a critical vulnerability, every application that depends on it is immediately at risk. Attackers actively scan for applications running vulnerable versions of popular libraries.

Transitive dependencies (packages pulled in by your direct dependencies) compound the problem. A single direct dependency can bring in dozens of transitive dependencies, any of which may contain vulnerabilities that are invisible without dedicated scanning tools.

How it works

1

CVE disclosed

A security vulnerability is discovered and publicly disclosed in a popular library, along with details about affected versions and exploitation methods.

2

Attacker scans for targets

Attackers use automated tools to identify applications running the vulnerable library version by probing for known signatures and behaviours.

3

Exploit deployed

Using publicly available exploit code or custom payloads, the attacker targets the vulnerable dependency to gain access or execute code.

4

Application compromised

The attacker leverages the vulnerability for remote code execution, data exfiltration, denial of service, or lateral movement within the infrastructure.

Common causes

No dependency monitoring

The team has no automated process to track dependencies and receive alerts when new vulnerabilities are disclosed in the libraries they use.

Ignoring audit warnings

Package manager audit warnings (npm audit, pip audit) are routinely ignored or suppressed, leaving known vulnerabilities unaddressed.

Pinning outdated versions

Dependencies are locked to specific outdated versions without a process for evaluating and applying security updates.

Transitive dependency risks

Vulnerabilities in deep transitive dependencies are invisible without SCA tooling, and updating them often requires upgrading direct dependencies.

How to detect it

Automated detection

  • SecPortal's SCA (Software Composition Analysis) scanner identifies vulnerable dependencies across your codebase with CVE mapping
  • Lockfile analysis detects both direct and transitive dependencies with known vulnerabilities
  • Continuous monitoring alerts you when new CVEs are published that affect your dependency tree

Manual testing

  • Run package manager audit commands (npm audit, pip audit, bundle audit) and review the reported vulnerabilities
  • Cross-reference dependency versions against the NVD (National Vulnerability Database) for known CVEs
  • Review dependency age and maintenance status, as unmaintained libraries are unlikely to receive security patches

How to fix it

Implement automated dependency scanning (SCA)

Integrate Software Composition Analysis into your CI/CD pipeline to automatically flag vulnerable dependencies before they reach production.

Keep dependencies updated

Establish a regular cadence for reviewing and updating dependencies. Prioritise security updates and critical patches.

Use lockfiles for reproducible builds

Commit lockfiles (package-lock.json, yarn.lock, Pipfile.lock) to ensure consistent dependency resolution and prevent supply chain attacks.

Monitor for CVE advisories

Subscribe to security advisories for your key dependencies and enable automated alerts from vulnerability databases and GitHub Dependabot.

Establish a patch management process

Define SLAs for patching vulnerabilities based on severity: critical within 24 hours, high within 7 days, medium within 30 days.

Compliance impact

Scan your dependencies for known CVEs

SecPortal's SCA scanner checks your dependency tree against the OSV vulnerability database. Start scanning for free.

No credit card required. Free plan available forever.