Font Size Change

HOMEIT SecurityMeasures for Information Security VulnerabilitiesQuarterly ReportsVulnerability Countermeasure Information Database JVN iPedia Registration Status [2019 4th Quarter (Oct. - Dec.)]

PRINT PAGE

IT Security

Vulnerability Countermeasure Information Database JVN iPedia Registration Status [2019 4th Quarter (Oct. - Dec.)]

February 19, 2020
IT Security Center

1. 2019 4th Quarter: Vulnerability Countermeasure Information Database JVN iPedia Registration Status

The vulnerability countermeasure information database JVN iPedia (https://jvndb.jvn.jp/en/) is endeavoring to become a comprehensive vulnerability database where vulnerability information is aggregated for easy access for IT users. JVN iPedia collects and/or translates the vulnerability information published by 1) domestic software developers, 2) JVN (*1), a vulnerability information portal run by JPCERT/CC and IPA, and 3) NVD (*2), a vulnerability database run by NIST (*3). JVN iPedia has been making vulnerability information available to the public since April 25, 2007.


1-1. Vulnerabilities Registered in 2019/4Q

~ JVN iPedia now stores 112,084 vulnerabilities ~

The summary of the vulnerability information registered to the Japanese version of JVN iPedia during the 4th quarter of 2019 (October 1 to December 31, 2019) is shown in the table below. As of the end of December 2019, the total number of vulnerabilities stored in JVN iPedia is 112,084 (Table 1-1, Figure 1-1).

As for the JVN iPedia English version, the total number of vulnerabilities stored is 2,093 as shown in the lower half of the Table 1-1.


Table 1-1. Vulnerabilities Registered to JVN iPedia during 4th Quarter of 2019
  Information Source Registered Cases Cumulative Cases
Japanese Version Domestic Product Developers 8 cases 226 cases
JVN 113 cases 8,875 cases
NVD 4,313 cases 102,983 cases
Total 4,434 cases 112,084 cases
English Version Domestic Product Developers 8 cases 226 cases
JVN 19 cases 1,867 cases
Total 27 cases 2,093 cases

1-2. 【Observation 1】Vulnerabilities in Adobe Flash Player

~ Registered 10 vulnerability countermeasure information with high severity level in 2019, consider migrating to alternative products by the end of support ~

On December 31, 2020, Adobe Systems will officially stop supporting, updating and distributing Adobe Flash Player(*4).

Figure 1-2 shows the percentage of severity of vulnerability information for Adobe Flash Player registered in JVN iPedia from 2017 to 2019. All vulnerabilities registered in the last three years are classified as the highest severity “High” (Level III, CVSS Base Score=7.0–10.0) or the next “Medium” (Level II, CVSS Base Score =4.0-6.9). The result indicates that the registered vulnerabilities are dominated by high severity vulnerabilities.

As for the number of registrations, 70 cases in 2017, 25 in 2018, and 10 in 2019, indicates decreasing trend. However, looking at the percentage of severity classified as “High”, it fluctuated widely, 90% in 2017, 44% in 2018, and 50% in 2019. Although 2017 is prominent, the proportion of high severity vulnerabilities is still high in 2019. The number of registrations is expected to decrease in the future, but the vulnerability information with high severity level is likely to be disclosed.

Figure 1-2. Severity of Vulnerability Information for Adobe Flash Player registered in JVN iPedia from 2017 to 2019(CVSSv2)

Generally, when a new vulnerability is discovered after the end of support, product vendors don't correct it. If you continue to use the support ended product, your risk of damage by the attack exploiting the vulnerability increase. It is recommended that organizations publicizing contents which use Adobe Flash Player take measures such as moving to alternative methods (i.e. HTML5). In addition, please inform the content users of how to migrate etc. Migration and notice should be done by the end of support, at the end of 2020.

IPA operates the cyber security alert service “icat (Flash version)” that uses Adobe Flash Player. The service will be ended before the end of 2020 when Adobe support ends and it will be unified to "icat for JSON" (IPA Cyber security Alert Service for JavaScript Object Notation) that does not use Adobe Flash Player(*5). As announced on the website, users of "icat (Flash version)" should migrate to "icat for JSON".

1-3. 【Observation 2】Vulnerabilities related to Remote Desktop Services

~ 63% of vulnerabilities related to Remote Desktop Services is “High” severity level ~

Microsoft released a security notice (CVE-2019-0708) of vulnerability of Remote Desktop Services, called "Bluekeep", in May, 2019(*6). Since the vulnerability allows unauthenticated attackers to execute attack via Remote Desktop Protocol (RDP) without any manipulation of the target system, they could be infected by self-propagating worms which could spread on the network, like "WannaCry" which wrecked havoc in 2017. In response to the vulnerability, Microsoft took exceptional measures of releasing patches for support ended OS, Windows XP and Windows Server 2003, in addition to security notice(*7). In November, 2019, the attack which abuses this vulnerability trying to execute crypto currency mining was confirmed. Paying close attention is required for some time in the future(*8).

In 2019, in addition to BlueKeep, Microsoft also disclosed vulnerabilities related to Remote Desktop Services and RDP used to connect them.

Figure 1-3 shows percentage of severity of vulnerability countermeasure information related to Remote Desktop Services and RDP registered to JVN iPedia in 2019 (Jan.1 - Dec. 31).

Table 1-2 is a list of those vulnerabilities. 12 out of 19 cases of disclosed vulnerability countermeasure information are classified as "High" and dominate 63% of all. Rest of 7 cases are "Medium" and there was no "Low" assigned case. CVSS basic score of "Bluekeep" (JVNDB-2019-003551)is 10.0 and classified as "High".

There is a tendency that registered vulnerabilities related to Remote Desktop Services and RDP in 2019 have high severity which contains CVSS base score 10.0.

Figure 1-3. Severity of vulnerability countermeasure information(CVSSv2)related to Remote Desktop Services and RDP registered to JVN iPedia in 2019 (Jan.1 - Dec. 31)


Table 1-2. Vulnerability countermeasure information(CVSSv2)related to Remote Desktop Services and RDP registered to JVN iPedia in 2019 (Jan.1 - Dec. 31)
No.IDTitle CVSSv2
Base
Score
1 JVNDB-2019-012975 Vulnerabilities of DoS in Remote Desktop Protocol of Microsoft Windows Products. 5.0
2 JVNDB-2019-012905 Vulnerabilities of information disclosure in Microsoft Windows XP. 5.0
3 JVNDB-2019-010491 Vulnerabilities of remote code execution in Windows Remote Desktop Client of Microsoft Windows products. 9.3
4 JVNDB-2019-010476 Vulnerabilities of DoS in Remote Desktop Protocol of Microsoft Windows Products. 7.8
5 JVNDB-2019-009253 Vulnerabilities of remote code execution in Windows Remote Desktop Client of Microsoft Windows products. 9.3
6 JVNDB-2019-009252 Vulnerabilities of remote code execution in Windows Remote Desktop Client of Microsoft Windows products. 9.3
7 JVNDB-2019-009209 Vulnerabilities of remote code execution in Windows Remote Desktop Client of Microsoft Windows products. 9.3
8 JVNDB-2019-009208 Vulnerabilities of remote code execution in Windows Remote Desktop Client of Microsoft Windows products. 9.3
9 JVNDB-2019-008030 Vulnerabilities of information disclosure in Microsoft Windows products. 5.0
10 JVNDB-2019-008029 Vulnerabilities of information disclosure in Microsoft Windows products. 5.0
11 JVNDB-2019-008028 Vulnerabilities of DoS in Remote Desktop Protocol of Microsoft Windows Products. 5.0
12 JVNDB-2019-007743 Vulnerabilities of remote code execution in Remote Desktop Services of Microsoft Windows products. 10.0
13 JVNDB-2019-007742 Vulnerabilities of remote code execution in Remote Desktop Services of Microsoft Windows products. 9.3
14 JVNDB-2019-007739 Vulnerabilities of remote code execution in Remote Desktop Services of Microsoft Windows products. 10.0
15 JVNDB-2019-007738 Vulnerabilities of remote code execution in Remote Desktop Services of Microsoft Windows products. 10.0
16 JVNDB-2019-006521 Vulnerabilities of remote code execution in Remote Desktop Services of Microsoft Windows products. 8.5
17 JVNDB-2019-006364 Vulnerabilities of information disclosure in Microsoft Windows products. 4.0
18 JVNDB-2019-004672 Microsoft Windows Remote Desktop Network Level Authentication Bypass Windows Lockscreen. 4.6
19 JVNDB-2019-003551 Vulnerabilities of remote code execution in Remote Desktop Services of Microsoft Windows products. 10.0

People working in organizations use Remote Desktop Services to access other devices in some cases. Since Remote Desktop Services is one of the Windows standard functions, when the device is shared, the function may being set effective unintentionally.

Remote Desktop Services is very useful, but it may cause huge damage or disruption when abused. It is recommended to apply security patch as soon as they become available.

2. Details on JVN iPedia Registered Data

2-1. Types of Vulnerabilities Reported

Figure 2-1 shows the number of vulnerabilities newly added to JVN iPedia during the 4th quarter of 2019, sorted by the CWE vulnerability types.

The type of the vulnerabilities reported most in the 4th quarter is CWE-79 (Cross-Site Scripting) with 535 cases, followed by CWE-20 (Improper Input Validation) with 516, CWE-200 (Information Exposure) with 302, CWE-125 (Out-of-bounds Read) with 226, CWE-787 (Out-of-bounds Write) with 187.

CWE-79 (Cross-Site Scripting), the most reported vulnerability type in this quarter, could allow attackers to display false webpages and/or steal information.

Software developers need to make sure to mitigate vulnerability from the planning and design phase of software development. IPA provides tools and guidelines, such as "How to Secure Your Website" (*9), "Secure Programing Guide" (*10) and "AppGoat" (*11), a hands-on venerability learning tool, for website developers and operators to build secure websites.

2-2. Severity of Vulnerabilities Reported

Figure 2-2 shows the yearly change in the CVSSv2 rating scale based severity of vulnerabilities registered to JVN iPedia.

As for the vulnerabilities added to JVN iPedia in 2019, 25.8 percent are “Level III” (7.0 - 10.0), 62.7 percent are “Level ll” (4.0 – 6.9) and 11.5 percent are “Level I” (0.0 – 3.9). This means 88.5 percent of all vulnerabilities registered are Level II or higher, which are potentially critical enough to cause damage like information exposure or data falsification.

Figure 2-3 shows the yearly change in the CVSSv3 rating scale based severity of vulnerabilities registered to JVN iPedia.

As for the vulnerabilities added to JVN iPedia in 2019, 15.8 percent are “Critical” (9.0 – 10.0), 41.9 percent are “High” (7.0 – 8.9), 40.7 percent are “Medium” (4.0 – 6.9) and 1.6 percent are “Low” (0.1 – 3.9).

To avoid threats posed by the known vulnerabilities, both product developers and IT users should pay close attention to vulnerability disclosure and update software they use to a fixed version or apply a security patch as soon as possible when they become available. IT users can check vulnerabilities newly published on JVN iPedia in RSS and XML format (*12) as well.

2-3. Types of Software Reported with Vulnerability

Figure 2-4 shows the yearly change in the type of software reported with vulnerability. Application vulnerabilities have been published most, accounting for 74.5 percent (14,470 out of 19,410) of the 2019 total.

Figure 2-5 shows the yearly change in the number of JVN iPedia-stored vulnerabilities in industrial control systems (ICS) used in critical infrastructure sectors. As of December 2019, the total of 2,333 ICS vulnerabilities have been registered.

2-4. Products Reported with Vulnerability

Table 2-1 lists the top 20 software whose vulnerabilities were most registered to JVN iPedia during the 4th quarter (October to December) of 2019.

In this quarter, Android OS with 315 cases is the 1st rank. From 2nd to 20th, various OS products are ranked, such as Microsoft Windows products, Linux OS (Debian GNU/Linux, Linux Kernel).

Besides those in the top 20 list, JVN iPedia stores and offers vulnerability information about a variety of software. IPA hopes software developers and users will make good use of JVN iPedia to efficiently check vulnerability information and take necessary action in a timely manner (*13).


Table 2-1. Top 20 Software Products Vulnerabilities Were Most Registered [Oct. – Dec. 2019]
RankCategoryProduct Name (Vendor) Number of
Vulnerabilities
Registered
1 OS Android (Google) 315
2 OS Debian GNU/Linux (Debian) 225
3 Browser Google Chrome (Google) 154
4 OS Linux Kernel (Kernel.org) 118
5 OS Fedora (Fedora Project) 99
6 OS Microsoft Windows 10 (Microsoft) 97
7 OS Microsoft Windows Server (Microsoft) 92
7 Firmware Qualcomm component (Qualcomm) 92
9 OS Microsoft Windows Server 2019 (Microsoft) 88
10 OS Microsoft Windows Server 2016 (Microsoft) 72
11 PDF Viewer Adobe Acrobat Reader DC (Adobe Systems) 70
11 PDF Viewer/Editor Adobe Acrobat DC (Adobe Systems) 70
13 CMS Magento (Magento, Inc.) 65
13 OS Microsoft Windows 7 (Microsoft) 65
15 OS Microsoft Windows 8.1 (Microsoft) 64
15 OS Microsoft Windows Server 2012 (Microsoft) 64
17 OS Microsoft Windows Server 2008 (Microsoft) 63
18 OS Microsoft Windows RT 8.1 (Microsoft) 60
19 OS Red Hat Enterprise Linux (Red Hat) 53
20 OS Ubuntu (Canonical) 38

3. Most Accessed Vulnerability Countermeasure Information

Table 3-1 lists the top 20 most accessed vulnerability countermeasure information in JVN iPedia during the 4th quarter of 2019 (October to December).

All the vulnerability countermeasure information ranked top 20 in this quarter are vulnerability countermeasure information released on the Vulnerability Countermeasure Information Portal Site JVN.


Table 3-1. Top 20 Most Accessed Vulnerability Countermeasure Information in JVN iPedia [Oct. – Dec. 2019]
NoIDTitleCVSSv2
Base
Score
CVSSv3
Base
Score
Date
Public
Access
Count
1 JVNDB-2019-000060 Multiple integer overflow vulnerabilities in LINE(Android) 6.8 6.3 2019/9/19 9,135
2 JVNDB-2019-000068 Rakuma App vulnerable to authentication information disclosure 2.6 4.7 2019/11/7 8,875
3 JVNDB-2019-010374 Vulnerability in Cosminexus HTTP Server and Hitachi Web Server - - 2019/10/11 8,116
4 JVNDB-2019-000064 Multiple vulnerabilities in WordPress Plugin "wpDataTables Lite" 6.5 7.2 2019/10/11 8,097
5 JVNDB-2019-000063 Multiple vulnerabilities in EC-CUBE module "REMISE Payment module (2.11, 2.12 and 2.13)" 5.0 5.3 2019/10/7 7,200
6 JVNDB-2019-009884 FON routers may behave as an open resolver 5.0 5.8 2019/10/2 7,164
7 JVNDB-2019-000062 Multiple OS command injection vulnerabilities in DBA-1510P 5.8 8.8 2019/10/7 7,117
8 JVNDB-2019-011088 Trend Micro OfficeScan vulnerable to directory traversal 5.2 8.2 2019/10/29 7,059
9 JVNDB-2019-000065 NetCommons3 vulnerable to cross-site scripting 4.3 6.1 2019/10/15 6,921
10 JVNDB-2019-000059 apng-drawable vulnerable to integer overflow 6.8 5.3 2019/9/12 6,866
11 JVNDB-2019-000054 Cybozu Garoon vulnerable to SQL injection 6.5 7.6 2019/8/26 6,853
12 JVNDB-2019-000066 PowerCMS vulnerable to open redirect 2.6 4.7 2019/10/23 6,779
13 JVNDB-2019-000053 Smart TV Box fails to restrict access permissions 6.8 7.3 2019/8/23 6,580
14 JVNDB-2019-000043 Multiple vulnerabilities in Hikari Denwa router/Home GateWay 4.3 6.1 2019/6/27 6,575
15 JVNDB-2019-000040 Multiple vulnerabilities in VAIO Update 6.8 7.8 2019/6/21 6,505
16 JVNDB-2019-000049 WordPress Plugin "Category Specific RSS feed Subscription" vulnerable to cross-site request forgery 2.6 4.3 2019/7/18 6,447
17 JVNDB-2019-000048 WordPress Plugin "WordPress Ultra Simple Paypal Shopping Cart" vulnerable to cross-site request forgery 2.6 4.3 2019/7/16 6,415
18 JVNDB-2019-007404 WonderCMS vulnerable to directory traversal 5.5 6.4 2019/8/9 6,402
19 JVNDB-2019-010375 Multiple Vulnerabilities in Hitachi Global Link Manager - - 2019/10/11 6,277
20 JVNDB-2019-000036 WordPress Plugin "Contest Gallery" vulnerable to cross-site request forgery 2.6 4.3 2019/6/12 6,094

Table 3-2 lists the top 5 most accessed vulnerability information among those reported by domestic product developers.


Table 3-2. Top 5 Most Accessed Vulnerabilities Reported by Domestic Product Developers [Oct. - Dec. 2019]
NoIDTitleCVSSv2
Base
Score
CVSSv3
Base
Score
Date
Public
Access
Count
1 JVNDB-2019-010374 Vulnerability in Cosminexus HTTP Server and Hitachi Web Server - - 2019/10/11 8,116
2 JVNDB-2019-010375 Multiple Vulnerabilities in Hitachi Global Link Manager - - 2019/10/11 6,277
3 JVNDB-2019-008917 Multiple Vulnerabilities in Hitachi Command Suite and Hitachi Infrastructure Analytics Advisor - - 2019/9/9 5,867
4 JVNDB-2019-011488 Information Disclosure Vulnerability in Hitachi Command Suite - - 2019/11/11 5,084
5 JVNDB-2019-011487 DoS Vulnerability in Hitachi Command Suite and Hitachi Infrastructure Analytics Advisor - - 2019/11/11 5,014

Note 1) Color Code for CVSSv2 Severity Rating Scale

CVSS Base Score = 0.0~3.9
Severity = Level I (Low)
CVSS Base Score = 4.0~6.9
Severity = Level II (Medium)
CVSS Base Score = 7.0~10.0
Severity = Level III (High)

Note 2) Color Code for CVSSv3 Severity Rating Scale

CVSS Base Score =
0.1~3.9
Severity = Low
CVSS Base Score =
4.0~6.9
Severity = Medium
CVSS Base Score =
7.0~8.9
Severity = High
CVSS Base Score =
9.0~10.0
Severity = Critical

Note 3) Color Code for Published Date

Published in 2017 or before Published in 2018 Published in 2019

Footnotes

(*1) Japan Vulnerability Notes: A portal for vulnerability countermeasure information including information on vendor response to the reported vulnerabilities and security support. Operated in the collaboration of IPA and JPCERT/CC.
https://jvn.jp/en/

(*2) National Vulnerability Database: A vulnerability database operated by NIST.
https://nvd.nist.gov/home.cfm

(*3) National Institute of Standards and Technology:A U.S federal agency that develops and promotes measurement, standards and technology.
https://www.nist.gov/

(*4) Flash & The Future of Interactive Content – Adobe
https://theblog.adobe.com/adobe-flash-update/

(*5) "icat for JSON" IPA Cyber security Alert Service for JavaScript Object Notation
https://www.ipa.go.jp/security/vuln/icat.html (In Japanese only )

(*6) CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708

(*7) What is the "BlueKeep" vulnerability that could become a new "WannaCryptor"?
https://ascii.jp/elem/000/001/890/1890827/ (In Japanese only )

(*8) Microsoft warns users to stay alert for more BlueKeep attacks
https://www.zdnet.com/article/microsoft-warns-users-to-stay-alert-for-more-bluekeep-attacks/

(*9) How to Secure Your Websites
https://www.ipa.go.jp/security/vuln/websecurity.html (latest version in Japanese only )

(*10) Secure Programing Guide
https://www.ipa.go.jp/security/awareness/vendor/programming/ (in Japanese only)

(*11) AppGoat
https://www.ipa.go.jp/security/vuln/appgoat/ (in Japanese only)

(*12) IPA Data Feeds
https://jvndb.jvn.jp/ja/feed/ (in Japanese only)

(*13) IPA Technical Watch - Daily Practice Guide: Tips on Vulnerability Management
The guide gives tips on how to efficiently collect and leverage vulnerability information.
https://www.ipa.go.jp/security/technicalwatch/20150331.html (in Japanese only)

Past Quarterly Reports

Contact

IT Security Center,
Information-technology Promotion Agency, Japan (ISEC/IPA)