Study Finds 87% of Organizations Exposed to Attacks Due to Known Vulnerabilities


The 2026 State of DevSecOps report reveals a critical tension between development velocity and security.

While organizations rapidly adopt AI-assisted coding, many fail to manage dependencies properly, leaving their software supply chains highly vulnerable to threat actors.​

Threat Intelligence Data

Threat VectorKey MetricSecurity Impact
Deployed Services87% of organizations have known vulnerabilities ​.High risk of active exploitation ​.
Outdated DependenciesMedian dependency is 278 days behind ​.Accumulation of unpatched security flaws ​.
Rapid Updates50% use libraries within 1 day of release ​.Exposure to malicious supply chain packages ​.
CI/CD Pipelines71% never pin GitHub Action hashes ​.Vulnerable to compromised workflow actions ​.

According to the DataDog research, 87% of organizations operate deployed services containing known exploitable vulnerabilities.

exploitable vulnerabilities in deployed services (Source: DataDog)

These flaws impact 40% of all services. Java applications show the highest vulnerability rate at 59%, followed by .NET and Rust.

Furthermore, 10% of global services run on end-of-life (EOL) runtime environments, with Go at 23% and PHP at 13%.

Data exposed (source: Data Dog)
Data exposed (source: Data Dog)

Developers also struggle with maintenance; the median third-party dependency is 278 days behind its latest major update, with Java and Ruby environments lagging the most.​

While delayed patching is dangerous, updating too quickly introduces severe supply chain threats. Half of all organizations adopt new third-party libraries within 24 hours of release.

Specifically, 54% of JavaScript and 55% of Python users install updates immediately.

This rapid adoption exposes them to malicious package attacks, such as the recent s1ngularity and Shai-Hulud npm worms.

Similar risks affect cloud infrastructure, with 32% of organisations deploying public Docker images and 12% using public Amazon Machine Images (AMIs) within a day of creation.​

Continuous integration pipelines remain highly susceptible to compromise. While every surveyed organization uses GitHub marketplace actions, a staggering 71% never pin these actions to a full-length commit SHA.

This oversight allows attackers to push malicious payloads through compromised actions. On the defense side, security teams face massive alert fatigue.

However, when runtime context and true exploitability are analyzed, only 18% of reported “critical” dependency vulnerabilities pose a genuine threat.

For example, 98% of .NET vulnerabilities are downgraded, while 49% of PHP flaws remain critical.

Mitigation Strategies

Attack SurfaceRecommended MitigationExpected Outcome
Third-Party LibrariesImplement a 7-day update cooldown period ​.Prevents installation of day-one malicious packages ​.
Cloud ImagesUse trusted first-party Docker Hub tags ​.Reduces risk of deploying compromised containers ​.
GitHub ActionsPin all action versions to full commit SHAs ​.Blocks automatic updates of compromised actions ​.
Alert ManagementAdjust CVSS scores using runtime context ​.Reduces critical alert volume by over 80% ​.

To secure modern pipelines, organizations must balance update cadences cautiously.

Implementing dependency cooldown periods, securing CI/CD workflows, and prioritizing vulnerabilities based on real-world exploitability will help teams maintain development speed without compromising their security posture.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link