By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Chainguard Finds 98% of Container CVEs Lurking Outside the Top 20 Images
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Chainguard Finds 98% of Container CVEs Lurking Outside the Top 20 Images
News

Chainguard Finds 98% of Container CVEs Lurking Outside the Top 20 Images

News Room
Last updated: 2026/01/31 at 2:29 PM
News Room Published 31 January 2026
Share
Chainguard Finds 98% of Container CVEs Lurking Outside the Top 20 Images
SHARE

The latest State of Trusted Open Source report from Chainguard gives details on current industry thinking about vulnerabilities in container images and the long tail of open-source dependencies. The report offers a data-driven view of production environments based on more than 1,800 container image projects and 10,100 vulnerability instances observed between September and November 2025.

Chainguard draws on telemetry from 290,000 images and almost half a billion builds to examine how customers actually consume and maintain open source components. It finds that foundational language and infrastructure images such as Python, Node, nginx, Go and Redis dominate production usage, forming what it describes as the baseline stack for the modern AI-driven software ecosystem. Python appears in about 72% of customer environments, with Node in 57% and nginx in 40%. These images are associated with model development, data processing, and inference workloads, as well as with surrounding observability and platform tooling.

However, the report warns that this visible layer of popular images is only a small part of the real landscape. The top 20 images account for about 1.37% of Chainguard’s catalogued images and roughly half of all container pulls. The other half of production usage comes from 1,436 long-tail images that make up more than 61% of the average customer’s manifest. Chainguard stresses that these long-tail images are often core components that are absolutely required for live services and infrastructure, rather than being short-lived experiments.

The distribution of vulnerabilities is highly skewed toward this long tail. Chainguard reports that only 214 of the CVE instances it remediated in the period, around 2%, occurred in the top 20 images. The remaining 98% (10,785 CVE instances) were in images outside that set. This finding suggests that the worst exposure sits in the parts of the stack where patching and governance are hardest to apply. For every CVE fixed in a top-20 image, the company says it resolved 50 CVEs in less popular images, a ratio it uses to illustrate the importance of working on the long tail of security. While the majority of these issues are medium severity, the report argues that organisations care most about how quickly critical and high-severity issues are resolved across their range of images.

On this measure, Chainguard emphasises how quickly they can fix security issues. During the three-month window, the company says it achieved an average remediation time of under 20 hours for critical CVEs, with 63.5% addressed within 24 hours, 97.6% within two days and all of them within three days. Chainguard fixed high-severity vulnerabilities in just over two days, medium-severity ones in about two and a half days, and low-severity issues in just over three days. These times are notably faster than Chainguard’s stated service-level objectives of seven days for critical CVEs and 14 days for others, and they apply across both popular and long-tail images.

Across our data, one takeaway stands out: modern software is powered by a wide, shifting portfolio of open source components, most of which live outside the top 20 most popular images. That’s not where developers spend their time, but it’s where the bulk of security and compliance risk accumulates.

The report also identifies compliance as a major driver of change in container security. It notes that 44% of its customers run at least one FIPS-compliant image in production, often to satisfy requirements from frameworks such as FedRAMP, DoD IL 5, PCI DSS, SOC 2, the EU Cyber Resilience Act, Australia’s Essential Eight and HIPAA. The most widely used FIPS images mirror the non-FIPS portfolio, with Python, Node, nginx, Go, Redis, Istio components, and cert-manager. Chainguard suggests that this pattern shows how regulatory pressure encourages the use of hardened, cryptographically verified open-source components that closely align with existing workloads.

The idea that risk is concentrated beyond the most familiar projects is not unique to Chainguard’s work. A 2024 study by NetRise found that commonly used Docker Hub containers contained an average of 604 known vulnerabilities, with more than 45% of them being more than two years old. The same research indicated that a small but significant fraction of critical and high-severity vulnerabilities in these containers had known exploits and links to active ransomware campaigns. NetRise’s study also suggests that long-lived, unpatched components in images pose a persistent risk, even when those images aren’t the most widely used.

Academic work has reached similar conclusions using different methods. An analysis of scientific container images published in GigaScience reported a mean of 460 vulnerabilities per image. The authors of this analysis noted that many images included full operating system distributions and additional unnecessary packages that were rarely updated, thereby creating a much larger attack surface. They also showed that carefully reducing image size and contents, and rebuilding them regularly, could significantly reduce vulnerability counts. This reflects the current industry best practice of using minimal base images and rebuilding container images frequently.

Sonatype’s State of the Software Supply Chain report adds another layer by tracking how often vulnerable components are used when patched versions already exist. The 2024 edition highlighted a rise in malicious open-source packages and reported that in 95% of cases where a vulnerable component has been used, a fixed version is already available. Sonatype also highlighted that a large number of dependencies remain unpatched for long periods, particularly for lower-severity issues. This combination of available fixes and slow uptake supports Chainguard’s argument that managed remediation and long-tail coverage can fill a gap left by the realities of open source maintenance.

Industry responses, such as from Checkmarx and Faith Forge, have highlighted some standard patterns. Security vendors describe image scanning as a standard part of continuous integration and deployment processes, with organisations increasingly linking these scans to policy-as-code rules that can block images with unpatched critical CVEs, missing signatures, or missing software bills of materials. In an analysis of the SBOM landscape, the European Union Agency for Cybersecurity (ENISA) also highlights guidance from agencies and regulators. It emphasises the importance of signed artefacts, verifiable build provenance and the ability to match SBOM contents against vulnerability intelligence. These trends all respond to the same structural issue that Chainguard highlights: the need to manage vulnerabilities not just in the most popular images, but across all containerised components used in contemporary software systems.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Apple Changes How You Order a Mac Apple Changes How You Order a Mac
Next Article Godot 4.4: Metal Rendering Backend, 3D Physics Interpolation, and More | HackerNoon Godot 4.4: Metal Rendering Backend, 3D Physics Interpolation, and More | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Think Twice Before Ordering A New TV On Amazon – BGR
Think Twice Before Ordering A New TV On Amazon – BGR
News
AYANEO’s latest handheld is skipping crowdfunding, and you can buy it now
AYANEO’s latest handheld is skipping crowdfunding, and you can buy it now
News
SpaceX wants to put 1 million solar-powered data centers into orbit
SpaceX wants to put 1 million solar-powered data centers into orbit
News
Keep Your Hands Warm With These Toasty Touchscreen Gloves
Keep Your Hands Warm With These Toasty Touchscreen Gloves
Gadget

You Might also Like

Think Twice Before Ordering A New TV On Amazon – BGR
News

Think Twice Before Ordering A New TV On Amazon – BGR

5 Min Read
AYANEO’s latest handheld is skipping crowdfunding, and you can buy it now
News

AYANEO’s latest handheld is skipping crowdfunding, and you can buy it now

4 Min Read
SpaceX wants to put 1 million solar-powered data centers into orbit
News

SpaceX wants to put 1 million solar-powered data centers into orbit

3 Min Read
Apple's New Lip-Reading Tech Is a Weird Signal of Where We're Heading
News

Apple's New Lip-Reading Tech Is a Weird Signal of Where We're Heading

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?