Even a one-day delay between the disclosure of a zero-day vulnerability and a fix for it can give adversaries a dangerous, if small, window of opportunity to exploit it. Yet that is exactly what happened last month when Microsoft released a patch for CVE-49719 in SQL Server 2016-2022, a critical zero-day that had been publicly disclosed the day before.
While no successful exploits were reported, the delay triggered an urgent response from software companies around the world. The vulnerability highlights the growing problem of software supply chain risk, where securing third-party dependencies is now every bit as important to as securing first-party systems and code.
Although Microsoft itself rated the vulnerability as unlikely to be exploited, the real problem was the massive attack surface: Many thousands of companies use SQL Server, including 98 of Fortune 100 companies. The vulnerability put organizations at risk of leaking sensitive database information and credentials by allowing attackers to access and extract data remotely without authentication. For instance, an unauthenticated attacker could send a specially crafted login request to a vulnerable server, tricking it into returning data stored in uninitialized memory. Aside from applying the Microsoft July 2025 Patch 2, key mitigation steps included blocking public access to the affected TCP Port 1433 and rotating credentials to prevent the leak of sensitive information.
The incident aptly exposed the software supply chain domino effect, where a vulnerability somewhere along the chain can have wide-reaching effects spanning dozens or even hundreds of organizations, including those that don’t even use SQL Server. This forces DevOps leaders to ask themselves whether they truly know where their software comes from, given that most modern software is integrated with many third-party components like embedded libraries and APIs. No longer is it enough to secure first-party code; software teams must also deploy continuous dependency scanning and ensure their third- and even fourth-party vendors guarantee rapid patching SLAs.
For DevOps and DevSecOps teams, this latest vulnerability-among countless others-should be viewed as a catalyst for implementing a Software Bill of Materials (SBOM) initiative. An SBOM is essentially a comprehensive inventory of all components that make up a piece of software, such as open-source libraries, frameworks, and dependencies. This allows organizations to quickly identify vulnerabilities in any part of the software supply chain and implement immediate triage and patching. With a clear understanding of the software’s composition, leaders can also enhance auditability and compliance and provide the transparency demanded by their customers and partners.