Netrise
Products
netrise-platform-icon
NetRise Platform
Analyze compiled code to create accurate SBOMs and uncover risk within the software that actually executes on your devices and throughout your enterprise.
ZeroLens-icon
NetRise ZeroLens
Identify weaknesses in compiled software before bad actors find and exploit them.
integration-menu-img
Integrations
NetRise integrates seamlessly into your workflow. Explore our ecosystem to secure your software supply chain.
Solutions
Solutions

Explore our comprehensive solutions designed to meet diverse industry needs and use cases, ensuring security, compliance, and maximum efficiency.

Featured Article
d654602309a74ff97e7cda24e838b73f
A CISO’s Guide to Reducing Software Supply Chain Risk
Use Cases
ph_seal-check-light
Compliance Adherence
Ensure compliance with global standards.
ph_chart-scatter-light
Continuous Monitoring
Real-time insights and alerts.
ph_warning-light
Holistic Risk Visibility
Achieve full visibility on vulnerabilities.
ph_list-checks-light
Inventory & Querying
Track and manage software assets.
ph_currency-circle-dollar-light
Return on Investment
Maximize risk-adjusted returns.
ph_hand-coins-light-1
SBOM Management
Maintain comprehensive software bills.
LockKey-Menu-Icon
Post-Quantum Cryptography Compliance
Be ready when quantum computing arrives.
ph_shield-check-light
EU CRA Compliance
Prove CRA readiness with evidence.
By Industry
ph_user-rectangle-light
Consulting Firms
Solutions for consultancy needs.
ph_barbell
Device Manufacturers
Compliance and security across devices.
ph_building-office-light
Enterprise Corporations
Security for large-scale environments.
ph_bank-light
Government Organizations
Reliable public sector solutions.
ph_ambulance-light
Healthcare
Secure and compliant healthcare data.
ph_lightning-light
Power & Utilities
Manage risk in critical infrastructure.
Resources
Explore NetRise

Find product docs, customer success stories, and company updates in one place.

Latest Resources
netrise-eu-cra-data-sheet-featured-img
NetRise & the EU Cyber Resilience Act (CRA): Compliance Data Sheet
Company
ph_users-three-light
About Us
Learn about NetRise
ph_briefcase-light
Careers
Explore careers with NetRise
ph_calendar-star-light
Events
Conferences, Webinars, and Podcasts
ph_shield-check-light
Security
Review NetRise security and compliance practices
ph_megaphone-light
Press Releases
Latest NetRise product and company updates
ph_newspaper-clipping-light
News & Awards
NetRise in the news, industry trends, and awards
Resource Library
note-light
Product Documents
Learn the platform, fast — briefs and data sheets
thumbs-up-light
Customer Success Stories
Outcome-focused stories from teams building and buying secure software
ph_newspaper-light
Deeper Dives
eBooks, Whitepapers, and longer-form content
ph_note-pencil-light
Blog
Stay informed with our latest articles
ph_microphone-light
Webinars, Podcasts, and Videos
Watch and listen on demand
ph_books-light
All Resources
Explore our full resource library by topic, industry, or asset
Blog Partners
Log in
Schedule a Demo
Log in
Schedule a Demo

Your Security Scans Are Missing Critical Vulnerabilities

Most scanners only check manifests, missing the code that’s actually running. This white paper shows how binary analysis uncovers hidden components—like statically linked crypto and vendored libraries—that conventional tools overlook. Learn why manifests reflect intent, not reality, and how to close the gap.


 

Resource Library White Paper Your Security Scans Are Missing Critical Vulnerabilities
White Paper

Your Security Scans Are Missing Critical Vulnerabilities

The code you think you’re running isn’t the code that’s actually running. Most scanners read manifests and package managers—not compiled reality. This white paper shows why critical vulnerabilities hide in binaries and how to find them.
Download the Report
netrise-security-scans-missing-critical-vulnerabilities-report-ft

Why This Paper Matters

logo-star

Manifests Don’t Reflect Reality

Traditional SCA shows declared dependencies, not what is actually compiled into production binaries.

Hidden Risk Lives in the Binary

Long-tail vulnerabilities often exist in compiled components that never appear in source-based reports.

Closing the Gap Between Intent and Execution

Security teams need a repeatable way to detect, validate, and remediate hidden exposures at scale.

Key Takeaways:

Hidden Risks in Your Attack Surface

If you build, secure, or manage software, your current scanners are likely missing significant portions of your real attack surface. Over the last 18 months, NetRise analysis repeatedly uncovered exploitable components absent from SBOMs and system diagnostics—from statically linked crypto to vendored libraries.

  • Manifest/SCA tools often miss statically linked and vendored code embedded in executables.
  • “Patched” systems can still execute old vulnerable versions inside modules and extensions.
  • Build pipelines introduce hidden dependencies via flags, caches, and code generation.
  • You need binary composition analysis to know what’s truly running.



netrise-security-scans-missing-critical-vulnerabilities

From Escalation to Evidence

Security teams challenged our findings. We welcomed it—and proved them out with manual binary forensics:

  • OpenSSL 3.0.0 inside Python SSL modules
    System packages showed OpenSSL 3.2.x, but Python extensions contained statically linked OpenSSL 3.0.0, leaving CVE-2022-3602/3786 paths open despite “patched” libraries.
  • rsync shipping a vendored zlib 1.2.8
    Package managers reported zlib 1.3.1, yet the rsync binary included a vendored 1.2.8 copy compiled in by default—invisible to manifest checks and ldd.
netrise-security-scans-missing-critical-vulnerabilities1

What You’ll Learn in This White Paper

  • Why scanners miss real risk
    How static linking, vendoring, transitive resolution, build caches, and code generation insert undocumented components into your executables.
  • How to prove (or disprove) a finding
    A field-tested validation playbook: strings/symbol inspection, source cross-checks, and build-flag analysis to turn a “weird result” into actionable evidence.
  • How to prioritize and fix
    Map hidden components to CVEs, confirm exploitability, and drive recompilation or vendor fixes (e.g., --with-included-zlib=no, Python system-lib flags).
  • How to operationalize visibility
    Why binary composition analysis must augment SBOM/SCA so your inventory, compliance, and response reflect what actually runs.
Signature-Branded-Linear-Red-Background

Why Scanners Miss It (and Attackers Don’t)

  • Static linking freezes vulnerable code inside modules—outside dynamic link checks.
  • Vendored libraries live inside source trees and binaries, never appearing in manifests.
  • Build choices (flags, caches, minimal version selection, hoisting) silently swap versions.
  • Code generation creates vulnerable paths that don’t exist pre-compile.

Bottom line: manifests represent intent. Only analyzing compiled artifacts reveals reality.

Background conceptual image of digital 3d icons

You might also like

Learn how we helped the customers to reach the next level

View All
Webinar
Keeping the Pace: Innovation Insights - Vulnerability Prioritization
Webinar
Fragile by Design: Large-Scale Evidence of Software Supply Chain Risk
Webinar
The Dependency Mirage: Hidden Vulnerabilities in Compiled Binaries
Footer Logo Know Our Platform
Company
  • Platform
  • ZeroLens
  • Integrations
  • About us
  • Partners
  • Careers
  • Security
use cases
  • Compliance Adherence
  • Continuous Monitoring
  • Holistic Risk Visibility
  • Inventory & Querying
  • Return on investment
  • SBOM Management
Industries
  • Consulting Firms
  • Device manufactures
  • Enterprise Corporations
  • Government Organizations
  • Healthcare
  • Power & Utilities
Resource Library
  • Blog
  • Whitepapers & Briefs
  • Webinars & Podcasts
News & Updates
  • Announcements
  • News
  • Events
  • Awards
  • Media Kit
LinkedIn X (Twitter) Facebook YouTube
Copyright © 2026 NetRise, Inc. All Rights Reserved
Terms of Service Privacy Policy Cookie Policy
Real person here 👉
Lightbox Image