Skip to main content

Upcoming Single-Tenant Version | 3.25

New features and enhancements

Additional Parameter in Page API

Developers using the new Projects page API now receive an additional attribute, "imported_proj_name", in the API response to represent migrated projects.

Filter by Vulnerability Severity

The Filter by Vulnerability Severity feature in the Analytics module allows users to filter vulnerabilities detected across all projects within the Checkmarx One platform based on their severity. Users can choose from severity levels such as High, Medium, and Low, providing a clear view of the most critical vulnerabilities.

Enhanced Result Retention for BYOR (Bring Your Own Results)

Previously, the BYOR feature retained only the most recent results per provider, discarding historical data. This limitation made it challenging for users to effectively triage, compare results over time, track vulnerability progress, and analyze remediation trends.

To resolve this, we now retain the full history of imported results per provider (tool name), allowing for more comprehensive tracking and analysis.

Triaging Capabilities in BYOR

We have integrated triaging capabilities into the BYOR (Bring Your Own Results) feature. This enhancement enables users to categorize, prioritize, and manage vulnerabilities based on severity, risk, and other relevant metrics. As a result, users can focus on addressing the most critical vulnerabilities first, ensuring a more effective security posture.

Dynamic Scan Tagging for Code Repository Imports

Customers can now dynamically set scan tags when performing scans through Code Repository imports during Pull Request and Push Webhook events. This feature enhances the flexibility and organization of scan results, allowing for better categorization and tracking of vulnerabilities.

Manual Network Exposure Configuration for Cloud Insights

Complex network architectures - such as those using CDNs, WAFs, and reverse proxies - make it challenging to automatically determine network exposure for each container image in various use cases. To address this, we have enabled customers to manually specify whether each container image is publicly exposed.

This enhancement allows customers to provide network exposure runtime data more easily, eliminating the need for us to develop automatic support for every potential use case.

Enhanced Scan Triggering for Cloud Insights

We have improved Cloud Insights by allowing users to trigger manual scans in addition to the existing automated scans that occur every 24 hours. This enhancement enables customers to initiate scans whenever there are changes to assets in the production environment or modifications in network exposure.

Expanded Attack Path Graph in Cloud Insights

The Cloud Insights Attack Path graph now provides a more holistic view for container images marked as publicly exposed. Users can access these comprehensive results in the left side panel, allowing for a more thorough understanding of vulnerabilities and security risks associated with their container images.

Editing project tags

Users are now able to edit project tags, instead of just deleting them. This significantly enhances the user experience, especially for those transitioning from SAST. This feature is particularly valuable for users with large tags, as it eliminates the need to manually recreate them and reduces the chance of errors. It provides flexibility and familiarity, enhancing efficiency and streamlining workflow.

Enhanced Developer Contribution Tracking

We have addressed the gap in critical information needed to accurately count contributing developers and display this data to our customers. By integrating a new gRPC call, we can now retrieve this information directly from the integrations team responsible for the imported repositories. This enhancement enables us to provide customers with accurate and comprehensive data on developer contributions.

Data Retention Improvement: Scan Locking Feature

During the implementation of Data Retention, we identified the absence of a mechanism to exclude specific scans from deletion. To address this, we have introduced a new feature that allows users to mark certain scans as "locked." This ensures that important scan data is not subjected to automated purging, providing users with better control over their critical information.

Updated Permissions for Risk Management

We have revised the existing permissions in the Risk Management module to enhance clarity and functionality. The previous permission structure, which combined viewing the top 10 most risky applications and the Risk Management tab, has been split into two separate permissions:

  • view-risk-management-dashboard: Allows users to view the top 10 most risky applications.

  • view-risk-management-tab: Grants access to view the content within the Risk Management tab.

The update-risk-management permission remains unchanged, enabling users to edit the table in the tab.

Additionally, the view-risk-management permission will be removed to streamline access and improve user experience.

Improving Risk Management Consistency

The current risk management approach lacks consistency compared to the established method for SAST results, where clicking a result opens a tab in the same table. This inconsistency hampers the efficiency of risk assessments and limits access to partial MFE results.

To address this, we are implementing a new tab for displaying result views, providing a centralized location for users to access crucial risk management data clearly and organized. This enhancement will improve visibility and accessibility, leading to quicker analysis and more informed decision-making.

Note

Users must perform a re-scan of their projects with SCA results for these changes to work properly.

New Code Retention Controls

We have developed two related features that enhance code privacy and result clarity:

  • Delete Code After Scan: The entire source code is removed once a scan is completed. While scan results remain visible, clicking on a result will not display the source code.

  • Keep Code Snippets: Only a few relevant lines of code related to each result are stored and shown when a result is clicked.

Currently, these features are controlled by feature flags with no option for user-driven activation or deactivation.

New 'Detection Date' Column in Results Viewer

We have introduced a Detection Date column, displaying the date each vulnerability was detected. This column is sortable and includes a filter option to help users easily manage and view vulnerability timelines.

SAST Engine Upgrade

The SAST engine in Checkmarx One has been upgraded to version 9.6.7. To discover all the new features and updates in the latest version, refer to this page.

SCA Updates

Private Packages

We now identify private and unresolved packages in the scanned project. Private Packages are shown in the SCA Results > Packages tab.

Notice

A “private package” is a package or library developed in-house that is being used across the organization. For example, a logging library that was developed in-house and is used by several different projects. These packages are only visible to the specific collaborators/teams that were granted access.

Private Packages Enhancement

We have expanded our support for private packages. When viewing the list of private packages in the Scan Results > Packages tab, you can now drill down to show additional details for a specific package.

Learn more about private packages here.

Remediation Tasks Tab

We added a new tab, Remediation Tasks, to the SCA results viewer. This tab shows detailed information about specific remediation tasks that Checkmarx recommends implementing for your Project. These tasks involve replacing vulnerable packages in your project with non-vulnerable versions of those packages.

Notice

Remediation tasks are currently supported only for JavaSript npm packages and for Nuget packages with .csproj manifest files, otherwise this tab isn't shown.

The Remediation Tasks tab contains sub-tabs that show two types of pages:

  • All Remediation Tasks – shows a list of remediation tasks that are recommended for this Project, with general info about each task.

  • Task Details – shows detailed info about a specific task. The task details tab is opened by clicking on the How to fix button in a task row in the All Remediation Tasks sub-tab.

Learn more about Remediation Tasks here.

Export Remediated Manifest File

You can now generate remediated manifest file/s that contain the recommended versions of your packages. You can download the remediated manifest files and use them to update your project.

You can export the remediated manifest file/s from the SCA scan results viewer page. The file/s is exported as a zip archive, which maintains your project's file structure.

Notice

Current limitations:

  • Supported only for npm package.json manifest files

  • Remediates only direct dependencies (not transitive)

  • Because this method updates all vulnerable packages (sometimes changing a major version) it may break methods used in your code. You may need to refactor your code to avoid changes in functionality.

SCA Resolver Version 2.11.4

  • Added the "@" symbol to the list of allowed characters for parameter sanitization

  • For Unity, improved detection of manifest.json files

  • For SBT, fixed plugins.sbt file permissions for dependency resolution

  • For Gradle, improved submodule detection

  • For Nuget, improved framework package version detection  

Download the new version here.

SCA Auto Pull Request

For Code Repository Integration projects, we now support automatically submitting a pull request to remediate SCA vulnerabilities. The PR updates the package versions specified in your manifest file with remediated versions of those packages based on Checkmarx's recommendations. This feature is supported for all supported SCMs (GitHub, GitLab, Bitbucket and Azure DevOps).

This feature can be activated on the project level by turning on the SCA Auto Pull Request toggle in the project settings.

Limitations

  • Currently supported only for npm package.json manifest files.

Improving Clarity in SCA Risk Results

SCA results in application risk management often lack clarity due to the use of generic framework names, requiring users to invest additional effort to understand the associated risks.

By renaming framework types with specific SCA conventions, we can provide clearer and more meaningful risk classifications. This enhancement improves the user experience and boosts productivity by making the SCA risk results easier to interpret.

Delta Scan feature

Note

This feature is currently available only in Multi-Tenant environments and is not yet supported for Single-Tenant customers.

We have dramatically cut the time of SCA scans by introducing the new Delta scan feature. When rescanning an existing project, if the manifest files haven’t been changed since the last scan, then we skip the dependency resolution process. This can cut scan times by up to 95% without detracting from the accuracy of the scan.

Currently, this only applies to scans run in the cloud, not to scans run using SCA Resolver.

For more information, click here.

IaC Security Updates

Checkmarx One now runs IaC Security version 2.1.3. This includes CWE information for the following platforms:

  • Terraform 

  • OpenAPI

  • Ansible

  • CloudFormation

  • Kubernetes

  • gRPC

  • Knative

  • Buildah

  • Pulumi

  • Crossplane

  • CICD

  • Google Deployment Manager

  • ServerlessFW

  • Azure Resource Manager

  • DockerCompose

Access Management (IAM) Updates

IAM Improvements

  • Updated the label of the toggle for enabling downloading source code.

  • Improved effectiveness of searching for groups and sub-groups.

IAM Resolved Issues

  • API key that was created from the SAML user returned "unknown_error" for API call openid-connect/token.

  • SAML SSO login not working when Validate Signature is enabled.

  • Revoked Api Key appears as valid in API Keys tab.

  • The IAM Groups tab is not correctly showing the groups list, because the API is hardcoded filtering the results up to 200 results.

Resolved issues

  • Container Security Results were not loading after new AM feature flags were turned on.

  • Unclear error message when trying to access an application without permission.

  • Autofill is unexpectedly triggered for tags and tokens in Project Settings.

  • DAST False positive: .htaccess information leak.

  • Users with manage-groups roles can become Admin.

  • API results yield wrong information.

  • Failed to generate a Scan Report with SCA engine.

  • An error occurs when opening a vulnerability.

  • Package Reliability Indicators values in AppSec Knowledge Center disappear.

  • SBOM scan fails if purl is generic (POC).

  • SCA Scan: Package path is not loading.

  • Python SBOM SPDX scan fails (pip vs Pip).

  • Top vulnerabilities with empty vulnerability.

  • Search not working in "Assigned to" field for Azure DevOps feedback app.

  • Refresh organization data flow fails with an exception.

  • Unable to generate PDF/CSV reports.

  • Changing the vulnerability state to something other than what was indicated in the last scan of the project resulted in the error "Failed to set need for recalculation."

  • Inconsistency between the results state in Analytics and the vulnerability state in the Project.

  • In a container scan, if a package was identified as malicious, there were no available details about the malicious package, which prevented any triage.

  • Infinite scans loop when GitLab Webhook had parameters: merge_status as cannot_be_merged and detailed_merge_status as conflict.

  • Incorrect values were displayed on the graph Vulnerability Density in Analytics > Executive Overview.

  • Failed to generate the Analytics report when using the Add By Tags option.

  • Ubuntu: Latest docker file scanning results with 5 false negatives.

  • A user without view queries permissions, could still open and view the query editor.

  • When generating the Open Vulnerabilities Report for multiple applications, the process failed and returned the error message: “failed to generate the report report_id.pdf.”

  • Unable to see the full group names for longer entries.

  • Contributing Developers count didn’t match the CSV file that should represent it.

  • Report ignored vulnerabilities that were not marked as ignored.

  • Unable to generate a Project report.

  • Scan report should change its result link to the new viewer format.

  • Grouping by state in Result Viewer filtered incorrectly.

  • In repository projects, when only one branch existed, users could not select this branch from the dropdown menu, nor could they verify or set it as the primary branch.

  • New Result Viewer was failing to open for specific result, with "Something went wrong" error message on the UI.

  • Docker Hub rate limit was exceeded.

  • UI detected a package version that did not match the scanned dependency file.

  • Add retry to publish messages (distributed package) - JASPER SERVICES.

  • Wrong version of scikit-learn python package reported.

  • Scans got stuck during package usage calculation.

  • Viewing SCA results from the Scanners page returned a 400 error.

  • API results were not retrieving all the information from the ExploitablePath.

  • Failed to download the PDF report due to the error: “Something went wrong – failed to generate report.”

  • The Scan-Summary API was returning a negative number of findings.

  • Traditional Chinese characters were masked in the project report.

  • The DAST scan initiated from Checkmarx One was throwing DOM errors.

  • Attack Vector was throwing errors.

  • API security scans returned duplicate vulnerabilities when pagination was configured to display 10 items per page.

  • The POST /repos-manager/project-conversion API call remained in an ongoing state indefinitely.

  • Packages with malicious risks or Suspected Malware were experiencing an infinite loading issue.

  • It was required to add retry to publish messages on SCA services.

  • The scan of the SBOM CycloneDX version 1.2 returned no results.

  • Two different versions of jackson-databind were reported in same module though only one version appeared in the pom.xml.