HOMEIT SecurityMeasures for Information Security VulnerabilitiesIPA/ISEC:Vulnerabilities:Filtered Vulnerability Countermeasure Information Tool “MyJVN” Now Available
Make vulnerability countermeasure information gathering easier for SME(Small and Medium-sized Enterprise)s
October 23, 2008
>> JAPANESE
Information-technology Promotion Agency, Japan (IPA, Chairman Koji Nishigaki) announced the release of a filtered vulnerability countermeasure information tool “MyJVN” on October 23, 2008, which offers the services, such as the customized filtering, auto searching and checklist creation, that help IT users make the better use of JVN iPedia and gather vulnerability countermeasure information more easily and efficiently.
“MyJVN” URL: http://jvndb.jvn.jp/apis/myjvn/ (in Japanese)
In addition, MyJVN now supports CPE (Common Platform Enumeration) on a trial basis to strengthen international collaboration and cross-referenceability. An introductory document to CPE is also available on the IPA web site.
JVN iPedia(*1) is a vulnerability countermeasure information database focused on domestic use and collects vulnerability and countermeasure information about software pervasively used in Japan. It now stores more than 5,400 vulnerability information.
The new tool “MyJVN” improves the usage of vulnerability countermeasure information stored in JVN iPedia by making it easier and more efficient for users to collect their target information through the services like customized filtering, auto searching and checklist creation.
In addition, MyJVN started trial of CPE (Common Platform Enumeration), a structured naming scheme to identify IT products, to strengthen international collaboration and cross-referenceability.
CPE has been developed through the leadership of MITRE(*2) with the sponsorship of the U.S. Department of Homeland Security.
For more information on CPE, please refer to:
CPE Overview ( http://www.ipa.go.jp/security/english/vuln/CPE_en.html )
JVN iPedia and MyJVN already supports CVE(*3), CVSS(*4) and CWE(*5). Continuing to CPE, IPA will keep working on promoting an infrastructure that could help users implement security measures efficiently by introducing cross-referenceable vulnerability information standards into JVN iPedia.
MyJVN allows users to view only their target vulnerability countermeasure information from stored data of JVN iPedia. Select vendors (Figure 1) and products (Figure 2) and MyJVN will list vulnerability countermeasure information only related to what the users have selected (Figure 3).
Furthermore, clicking a title in the list of vulnerabilities allows the users to see the detail of the selected vulnerability (Figure 4). On the detail page, the users could check, for example, which products/system are affected, how severe the effects would be and how to counter the vulnerability.
Figure 1. Vendor Selection Wizard Screen
Figure 2. Product Selection Wizard Screen
Figure 3. Filtering Result – List of Target Vulnerability Information
Figure 4. Detail Page of Selected Vulnerability
Users do not need to set the filtering requirements each time. Once set, the vulnerability countermeasure information will be automatically reloaded based on the latest filtering requirements set by each user when the user uses MyJVN. Just accessing MyJVN and the users can always gather the latest vulnerability countermeasure information of their interest.
The users can use a checklist to see if they are catching up with or behind the vulnerability countermeasure implementation. A vulnerability checklist lists key items from vulnerability countermeasure information, such as the published date, ID, title, overview, severity and product/system affected. The users can print it out and use as a paper checklist (Figure 5).
Figure 5. Checklist
CPE (Common Platform Enumeration) is a structured naming scheme for hardware and software that compose IT systems. CPE has been developed through the leadership of MITRE with the sponsorship of the U.S. Department of Homeland Security and the Version 1.0 was released on January 30, 2007. Through its adoption into the U.S. national vulnerability database NVD(*6) operated by NIST(*7) and Federal Desktop Core Configuration (FDCC)(*8), CPE had been revised and the Version 2.1 was released on January 31, 2008.
MyJVN has a mechanism to cross-reference vulnerability countermeasure information in JVN iPedia by CPE Names using the CPE Dictionary used in NVD as reference.
IPA will continue its efforts in providing vulnerability countermeasure information and improving infrastructure for the better flow and use of vulnerability countermeasure information by advancing cross-referenceability with the CPE Dictionary and adopting CPE Names as the product identifier.
For more information on CPE, please refer to an introductory document to CPE at the following:
http://www.ipa.go.jp/security/english/vuln/CPE_en.html
(*1)JVN iPedia: The vulnerability countermeasure database operated by IPA.
http://jvndb.jvn.jp/en/
(*2)MITRE Corporation: A not-for-profit organization that provides information technology support and research and development to the U.S. government.
http://www.mitre.org/
(*3)CVE: Common Vulnerabilities and Exposures
http://cve.mitre.org/index.html
(*4)CVSS: Common Vulnerability Scoring system. For more information, please refer to CVSS 2.0.
http://www.first.org/cvss/cvss-guide.html
(*5)CWE: Common Weakness Enumeration. For more information, please refer to CWE Overview:
http://www.ipa.go.jp/security/english/vuln/CWE_en.html
(*6)NVD: National Vulnerability Database. A vulnerability database run by NIST.
http://nvd.nist.gov/
(*7)NIST: National Institute of Standards and Technology. A federal agency that develops and promotes measurement, standards and technology.
http://www.nist.gov/
(*8)FDCC: Federal Desktop Core Configuration. A mandated security standard that requires all federal agencies standardize the minimum configuration of PC settings.
http://nvd.nist.gov/fdcc/index.cfm
IT Security Center,
Information-technology Promotion Agency, Japan (ISEC/IPA)
E-mail: