Modern software is built on complex supply chains of open-source and third-party components. According to industry data, a whopping 96% of applications contain open-source components, averaging 526 components per application, which leads to a deluge of vulnerability alerts.
Product security teams are often awash in vulnerability reports, where a large portion of findings turn out to be irrelevant or false positives. In fact, nearly one-third of teams report that most detected vulnerabilities are false positives. This overload creates alert fatigue and makes it difficult to identify which issues truly demand attention. Traditional scanning tools list every known CVE in every component without context, forcing teams to sift through hundreds or thousands of alerts, many of which pose no immediate threat.
Reachability analysis has emerged as a game-changer to cut through this noise with a specific focus on whether a vulnerable code path can actually be accessed (or “reached”) in a real-world scenario. Instead of treating all vulnerabilities as equal, it distinguishes those that are actively exploitable in the context of an application from those that are merely theoretical.
A vulnerability in a component that the application never calls is a vastly lower risk than one sitting in the direct execution path of user inputs. By homing in on reachable, exploitable issues, organizations can prioritize fixes on the vulnerabilities that truly matter and de-prioritize or filter out the rest.
Reachability analysis offers a critical, contextual filter to separate theoretical vulnerabilities from those that are truly actionable. At Binarly, we’ve taken reachability analysis to the next level. Our flagship Binarly Transparency Platform integrates advanced static and dynamic techniques with deep binary analysis to deliver a comprehensive view of vulnerability exploitability, tailored for today’s complex environments.
Computing the reachability of a vulnerable code segment is inherently challenging. In a purely static context, determining whether a program point can be executed isn’t simply a matter of “yes or no.” Instead, it requires an intricate analysis of control flow, data propagation, and environmental configuration. To address these challenges, Binarly has developed a taxonomy of reachability that classifies vulnerabilities by the pathways through which they may be exploited, providing nuanced insight into the actual risk posed.
Before delving into our approach, it is useful to clarify a few key definitions:
Binarly’s analysis differentiates several types of reachability:
These classifications help prioritize vulnerabilities not simply by their severity, but by how “reachable” they are in the context of the environment in which the software runs.
At the core of our platform is an advanced static analysis engine that decomposes a software component into its basic building blocks. Here’s how we do it:
Software does not operate in a vacuum. Components interact, and the environment in which they run -- defined by configuration files, boot scripts, container entry-points, and more -- critically influences vulnerability exploitability. Binarly extends reachability analysis beyond the single component to include:
By classifying vulnerabilities according to their reachability, the Binarly Transparency Platform transforms raw vulnerability data into actionable intelligence. Rather than treating every vulnerability equally, organizations can prioritize fixes for those vulnerabilities that are demonstrably reachable and hence pose a higher risk. This triage mechanism not only saves time but also focuses resources on mitigating the vulnerabilities that truly matter.
When evaluating third-party software or firmware, the sheer volume of reported vulnerabilities can be daunting. With our reachability metrics, organizations can assess the actual risk added by integrating a component. A component with a high number of reported vulnerabilities might, upon analysis, reveal that only a few are reachable in the target environment. This nuanced view empowers procurement and product security teams to make informed decisions without overestimating risk based solely on vulnerability counts.
Our forthcoming call-graph reachability metrics will further refine this approach. These metrics will report exactly how a vulnerability can be reached within a binary, classifying it based on:
Early examples in domains such as Baseboard Management Controller (BMC) firmware and UEFI modules have already demonstrated how these classifications correlate with real-world exploit scenarios.
In a world where vulnerabilities are reported in overwhelming numbers, reachability analysis offers a critical filter—focusing remediation efforts on those vulnerabilities that truly pose a risk. The Binarly Transparency Platform harnesses advanced control-flow and data-flow analysis, symbolic execution, and environmental context to provide a comprehensive, multi-layered view of vulnerability exploitability.
By classifying vulnerabilities into direct, exported, referenced, and undetermined reachability categories -- and by producing trace evidence and quantitative metrics -- the platform enables enterprise procurement and product security teams to:
Binarly’s approach represents the cutting edge of vulnerability management—bridging the gap between deep technical analysis and strategic risk management, and ensuring that every vulnerability is understood not just as a number on a report, but as a real-world risk that can be measured, prioritized, and ultimately mitigated.