CWE-477: Use of Obsolete Function

low-risk

The code uses deprecated or obsolete functions, which suggests that the code has not been actively reviewed or maintained.

Abstraction: Base

Common Consequences

Other Quality Degradation

Detection Methods

Automated Static Analysis - Binary or Bytecode

According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Binary / Bytecode Quality Analysis Cost effective for partial coverage: Bytecode Weakness Analysis - including disassembler + source code weakness analysis

Manual Static Analysis - Binary or Bytecode

According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Binary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies

Dynamic Analysis with Manual Results Interpretation

According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Debugger

Manual Static Analysis - Source Code

According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Manual Source Code Review (not inspections) Cost effective for partial coverage: Focused Manual Spotcheck - Focused manual analysis of source

Automated Static Analysis - Source Code

According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Source Code Quality Analyzer Source code Weakness Analyzer Context-configured Source Code Weakness Analyzer

Automated Static Analysis

According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Origin Analysis

Architecture or Design Review

According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Formal Methods / Correct-By-Construction Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)

Real-World Examples (10)

CVE CVSS EPSS KEV
CVE-2025-49220 9.8 9.9%
CVE-2025-49219 9.8 9.2%
CVE-2025-49213 9.8 6.3%
CVE-2025-49212 9.8 6.3%
CVE-2025-49214 8.8 3.9%
CVE-2025-49217 9.8 3.6%
CVE-2018-17890 9.8 0.7%
CVE-2022-1384 4.7 0.3%
CVE-2025-49216 9.8 0.3%
CVE-2019-18251 8.8 0.3%
0
/ 100
low-risk
Active Threat 0/50 · Minimal
Exploit Availability 0/50 · Minimal