A vulnerability is a software bug that hackers can exploit to attack an application. Ideally, software is written so as to proactively thwart the efforts of bad actors, but that is often not the case. With the heightened sensitivity to cybersecurity in general, and in merger and acquisition (M&A) transactions in particular, understanding how vulnerable software assets are is an important component of software due diligence.
That said, in modern software applications, there will never be a state of “zero vulnerabilities.” When evaluating the software quality of a potential acquisition target’s software, this is a very important point to remember. However, this is not a recommendation to ignore vulnerabilities or an excuse for vulnerable applications. Rather, it is meant to underscore the importance of arming yourself with the information needed to effectively understand which vulnerabilities present the biggest threats and how to prioritize remediation.
Vulnerabilities do not all present equal risk. Some might be exploited remotely, and some might have no proven exploit at all. Some vulnerabilities might be found in code called directly by an application, while others exist in a library that never makes it to production. Some might have easy, one-click fixes, while others require dozens of development hours to patch. The ability to confidently understand the particulars of a vulnerability is the key to understanding how it impacts an application, its users, and the data it handles.
While I might have made the process sound simple, there is nothing simple about it. It can be difficult to understand all the aspects of a vulnerability, and most organizations don’t have the in-house expertise or resources to do so. This is why Synopsys provides Black Duck® customers with Black Duck Security Advisories (BDSAs) about the vulnerabilities we identify in target codebases.
But just handing over a large list of components and vulnerabilities would be confusing and burdensome, so we augment it with information that has been researched, confirmed, and curated by our team of cybersecurity experts. Details such as severity scoring, descriptions, exploits, remediation guidance, reachability, and impacted versions give security teams the information needed to understand the impact of a vulnerability on an application. This is key to understanding the “so what?” of the findings, so you can best evaluate the security of the software you acquire and what it will take to bring it up to snuff.
Some of the information you get from a BDSAs in your audit report include
These details are only a subset of what is provided by BDSAs in our open source risk analysis. Many audit and application security vendors claim to have some capability in this area, but BDSAs provide the most accurate and actionable security advisories offered.
With the heightened dependence on software assets, software due diligence is only getting more difficult. By not simply dropping a virtual box full of audit results on our customers, we are easing the burden of risk evaluation and planning for mitigation. At Synopsys, we aim to be your trusted advisors in evaluating the quality of the assets that you’re acquiring or selling. BDSAs are one example of insights we provide to enable our customers to put audit results to work.
If you’re involved in technical due diligence or tech company acquisitions at all, check out how the Black Duck Audit group has become a trusted partner by both acquirers and target companies alike.