- Checkmarx Documentation
- Checkmarx One
- Release Notes
- Upcoming Multi-Tenant Version | 3.30
Upcoming Multi-Tenant Version | 3.30
Multi-Tenant release date: January 26, 2025
Warning
The content and dates of these Release Notes are provisional and subject to change.
All new features, enhancements, and resolved issues will be available upon version deployment in the multi-tenant environment unless explicitly stated otherwise in the respective section's sub-heading.
New features and enhancements
Bulk Tag Assignment for Projects
(General availability: February 3)
Checkmarx One now allows users to execute bulk actions on multiple projects, enabling the assignment of tags to several projects simultaneously.
Focus on Production Branches
(General availability: February 3)
Analytics now prioritize the default Main branch (e.g., "main" or "master") of each project to enhance clarity and performance. This update ensures faster load times and more relevant data, and reduced confusion by focusing only on critical security issues from production branches, avoiding noise from test or non-production data.
Changes to Results API (CVSS 4.0)
We have added support for CVSS 4.0 for SCA vulnerabilities. Since the vulnerabilitiesDetails
object returned by the GET /results
API differs depending on the version of CVSS used for each vulnerability, you may need to adjust your workflows to accomodate the schema for 4.0 results. Details about the schema for CVSS 4.0 can be seen here.
Notice
CVSS v4.0 is currently supported only for results identified by the SCA scanner, not for Container Security results.
Cloud Insights Wiz Integration for Projects without Code Repository Integration
(General availability: February 3)
The Cloud Insights integration for enriching the data shown in your Wiz Vulnerability Findings now supports projects that don’t have Code Repository integrations.
Checkmarx now uses the URL or zip archive used to submit your source code (either via the UI or CLI) to identify correlations between Checkmarx One projects and the related Wiz scanned repos, enabling us to enrich the relevant repos with vulnerability info from Checkmarx One SAST scans.
PR Decoration Improvements
(General availability: February 3)
Formatting - We improved the formatting of the PR decorations by using collapsible tabs wherever practical.
Policy Violations - For SAST policies, we now show additional details about policy violations. This includes the specific conditions that were violated as well as details about each vulnerability that caused the condition to be violated.
Container Security - We now include results from the Container Security scanner in the list of issues shown in the PR decoration.
These updates apply to all supported code repositories: GitHub, GitLab, Bitbucket and Azure DevOps (except that Bitbucket doesn’t support collapsible tabs).
Policy Management - Break Build
(General availability: February 3)
The ability to configure a policy violation to break the build (i.e., fail the PR) for a Code Repository Integration project is now being released as GA together with the other features in version 3.30 (it had previously been released to BETA customers).
Now, as part of the policy configuration, you can turn on the Break Build toggle for each policy for which you want a violation to prevent the PR from being merged.
Note
The break build behavior will only be effective if you configure your SCM to block PRs when a Checkmarx One Break Build policy is violated. The procedure for setting up this configuration is different for each SCM, see here for details.
For more information see documentation.
Fast Scan and File Exclusion Enabled by Default
(General availability: January 26)
Fast Scan mode and File Exclusion are now enabled by default for all new projects, improving scan execution time while maintaining flexibility to meet security needs prioritizing speed over accuracy. For more information about how this will affect existing workflows, see here.
Note
For organizations that use the Checkmarx One CLI tool and/or the associated CI/CD plugins, we recommend upgrading to CLI version 2.3.11 which enables better control over whether or not each scan runs in Fast Scan mode.
Update License Count for Accurate Developer Tracking
(General availability: February 3)
To address cases where 0 developers are counted due to inaccessible private repositories, users can now enter repository access tokens in the project settings. This allows the system to call APIs and accurately fetch contributing developers, even for CLI scans with excluded .git folders or CI/CD scans without repository access.
Support for Unsetting the Primary Branch in Projects
(General availability: January 26)
Users can now unset the primary branch for a project. This allows results on the primary projects page to reflect the most recently scanned branch rather than being tied to a predefined primary branch
Notes Editing and Deletion Disabled in Results Viewer
(General availability: February 3)
Starting with version 3.30, notes in Results Viewer can only be added; editing or deleting existing notes is no longer allowed. This change ensures better traceability and record integrity.
Azure AI Guided Remediation Integration
(General availability: February 3)
The Visual Studio Code Plugin and CLI now feature guided remediation that integrates with the customer’s Azure AI environment, providing a secure alternative to the OpenAI platform.
For more information, see documentation.
Bicep Language Support
(General availability: January 26)
The system now supports Bicep language for deploying Azure resources. This enables customers to define and deploy Azure resources using a simpler, more concise syntax compared to traditional ARM templates.
DAST Scan History Support
(General availability: February 3)
Checkmarx One now fully supports DAST scan history, allowing users to access results from all previous successful scans, not just the latest one. Users can update results (such as severity and status) across all scans, with changes automatically reflected in all related scan results.
DAST Similarity ID Mechanism Update
(General availability: January 26)
The DAST similarity ID mechanism has been updated to utilize a new set of fields and apply targeted transformations to specific fields, enhancing consistency and accuracy.
Hide Codebashing Link When Not Relevant
Codebashing links are now shown in the SAST results viewer only when the following conditions are met:
The user has permission
view-codebashing
There is a dedicated Codebashing lesson for that particular vulnerability + language
Container Security Updates
Container Security Filter Settings
Checkmarx One now offers robust filter settings to enhance container security by enabling users to configure their scans for precision and relevance. Filters can be applied to files, folders, packages and images.
Filters can be applied both on the global (account) level as well as for specific projects. Filters can be set via the web application (UI) or API.
For detailed information about the filters that can be applied, see documentation.
Policy Management for Container Security
(General availability: January 26)
In the context of the Checkmarx One Policy Management feature, we now support creation of policy conditions for the Container Security scanner. We have added a specialized set of conditions for the Container Security scanner which can be used to create complex conditions using Condition Groups.
For more information, see Container Security Conditions.
Sysdig UI Integration for Runtime Insights
(General availability: February 3)
We’ve streamlined the onboarding process for customers using our Sysdig integration by enabling them to easily connect their accounts with a Spotlight token.
Once connected, customers with a Sysdig license can access runtime data to prioritize container risks effectively.
Quick Filters
(General availability: February 3)
We added quick filters to enable users to easily focus on key results. The quick filters are:
Malicious (for licensed accounts) - Focus on images flagged as malicious.
Runtime (for accounts with runtime integration - Show images actively running in the user's runtime environment.
Critical - Show images with critical vulnerabilities.
Fixable - Show images with fixed versions available.
SCA Updates
Support for CVSS 4.0
We have added support for the CVSS 4.0 scoring system, which uses additional metrics to provide better granularity and further refine the scoring methodology. We now show the CVSS 4.0 score for each vulnerability that has such a score. When no CVSS 4.0 score is available, we continue to use the most recent available score from previous scoring systems (3.1 or 2.0). Additional details about this change are available here.
Notice
Details about how this change will effect the Results API are described above.
New SCA Policy Conditions
We have added several new policy conditions, enabling granular detection of specific risk factors:
EPSS - set thresholds based on EPSS score or EPSS percentile.
State - set a condition for vulnerabilities in one or more specified states. Options are: To Verify, Proposed not Exploitable, Confirmed and Urgent.
Malicious Package detection (for accounts with the relevant license) - you can now create conditions based on specific types of malicious attacks (e.g., Typosquatting, Chainjacking etc.). You can also create conditions based on thresholds for the following package integrity metrics: Contributor Reputation, Reliability Score and Behavioral Integrity.
IAM Updates
(General availability: February 10)
New Permissions for SCM Credentials Manager
Four new permissions have been added under the Integrations category:
Create SCM Configuration: Allows creating an SCM configuration without repositories.
Update SCM Configuration: Enables updating an SCM configuration.
Delete SCM Configuration: Permits deleting an SCM configuration.
View SCM Configuration: Grants access to view SCM configurations.
Keycloak Upgrade
Keycloak was upgraded to version 26.
Concurrent Session Limiting
Users can now set a limit on the number of concurrent sessions per user, providing greater control and compliance with organizational policies.
Resolved issues
An error message
"Key 'cwe' not found in map"
occurred when attempting to save query results.The error message
"Something went wrong"
was displayed when attempting to view result details.The severity of a result wouldn’t update in the UI when notes were added.
An error occurred when attempting to generate a report due to the file size exceeding the allowed limit.
A SAST scan was incorrectly marked as "Completed" in the UI even when the scanner aborted with status code 65, displaying the message
"Error compiling queries."
Report generation permissions were ignored.
The project overview was incorrectly displaying no risk and empty sections, even for projects with known vulnerabilities.
Java Stored XSS results were incorrectly linked to the Java Reflected XSS lesson in Codebashing.
A discrepancy between the results displayed on the application page and the project overview for the same project.
The documentation needed to be updated to reflect the removal of Not Exploitable from the list of available options.
The Friendly Name attribute in the SAML Attribute to Role mapper was not behaving consistently with other mappers.
The proxy domain was not being parsed correctly when injected into the Authentication Agent.
An incorrect scan time was displayed in the right panel of the Scan History page.
The Analytics page was displaying "Partial" and "Running" statuses, which do not exist in the project.
Performance issues were occurring in the Scanners Used in Combination chart under the Scans tab in Analytics.
Report generation failed.
No results were displayed in Analytics when the filter was set to Last Day or Last Week.
In the Results viewer, the Changes Made In column's popup window was displaying incorrect or incomplete information.
A sorting inconsistency in the API
/scans
endpoint.In the Identity Provider Mapper, when the SAML Attribute to Groups type was used, the subgroups were not displayed.
When navigating to a tag field using the Tab key, pressing Enter was not recognized.
A number of scans failed due to Minio/S3 access errors.
Fix plugin documentation to include the needed permission.
Custom project queries with low severity were incorrectly categorized as high severity when imported into Checkmarx One.
The
viewerLink
for the SAST scan report in JSON format was incorrect.Project settings did not display group information.
The Total Vulnerabilities count was incorrect.
No results were shown in Analytics.
The source-resolver sandbox did not switch Java versions at the correct time.
Timeout errors occurred for TCP Redis access.
The source-resolver sandbox was throwing an exception with the message "No results".
Failure to retrieve JIRA issue type metadata.
In Analytics, the graphic and grid for "Vulnerabilities by State" were not displaying all the states for SCA.
Azure DevOps Pull Request Webhook Triggers were returning a 400 status code from the Checkmarx One endpoint for a specific project.
Failure to generate a project report.
An error occurred when attempting to generate a report for a project with more than 2147483647 lines of code.
In the Project Migration tab, project names were cut off and could not be fully viewed, even when hovering over them.
Azure Feedback App failed to create a work item due to exceeding the maximum length of the Description field.
The project conversion API was getting stuck in the IN_PROGRESS state.
The process of scan synchronization in Analytics needed improvement for better performance and reliability.
The
PUT /project
API allowed setting the same group multiple times