CWE-477: Use of Obsolete Function
low-riskThe code uses deprecated or obsolete functions, which suggests that the code has not been actively reviewed or maintained.
Common Consequences
Detection Methods
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Binary / Bytecode Quality Analysis Cost effective for partial coverage: Bytecode Weakness Analysis - including disassembler + source code weakness analysis
According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Binary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Debugger
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Manual Source Code Review (not inspections) Cost effective for partial coverage: Focused Manual Spotcheck - Focused manual analysis of source
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Source Code Quality Analyzer Source code Weakness Analyzer Context-configured Source Code Weakness Analyzer
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Origin Analysis
According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Formal Methods / Correct-By-Construction Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2025-49220 | 9.8 | 9.9% | — |
| CVE-2025-49219 | 9.8 | 9.2% | — |
| CVE-2025-49213 | 9.8 | 6.3% | — |
| CVE-2025-49212 | 9.8 | 6.3% | — |
| CVE-2025-49214 | 8.8 | 3.9% | — |
| CVE-2025-49217 | 9.8 | 3.6% | — |
| CVE-2018-17890 | 9.8 | 0.7% | — |
| CVE-2022-1384 | 4.7 | 0.3% | — |
| CVE-2025-49216 | 9.8 | 0.3% | — |
| CVE-2019-18251 | 8.8 | 0.3% | — |