CWE

Common Weakness Enumeration

A community-developed list of SW & HW weaknesses that can become vulnerabilities

New to CWE? click here!
CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
Home > Compatibility > CWE-Compatible Products and Services  
ID

Name of Your Organization:

Software Security

Web Site:

https://www.softsafe-tech.com

Compatible Capability:

SoftSec SCA

Capability home page:

https://www.softsafe-tech.com/product/SCA

General Capability Questions

Product Accessibility <CR_2.4>

Provide a short description of how and where your capability is made available to your customers and the public (required):

  1. Open the official website https://www.softsafe-tech.com/product/sca, as shown in figure 1.

    Figure 1.

  2. Click the red circle "apply for use" in figure 2.

    Figure 2.

  3. Enter the application information and click the submit button to submit the application,as shown in figure 3.

    Figure 3.

  4. After receiving the application, we will send the login address, user name, password and user manual to your email.

  5. The user can log in to the SCA system with the login information received, as shown in Figure 4.

    Figure 4.

  6. Click "new project" to create a new project, as shown in Figure 5.

    Figure 5.

  7. Click "new version" to create a new version, as shown in Figure 6.

    Figure 6.

  8. After the test is completed, click the project name to enter the test result query page in Figure 7.

    Figure 7.

  9. Click the number hyperlink in the "component name" column to view the details of the vulnerabilities in the current component. The "Vulnerability Type" in the component vulnerability list shows the correspondence between the current vulnerabilities and CWE vulnerabilities. If it can exactly match the CWE vulnerabilities, then Display the CWE vulnerability number in the current list, as shown in the Figure 8 below:

    Figure-8 Component specific vulnerability list

  10. Click on the CWE number hyperlink to view the vulnerability details

    Figure-9 A list of vulnerabilities in a certain component

  11. Click on the CWE number hyperlink in the figure above, and the page jumps to the description page of the CWE official website describing the current vulnerability, as shown in the following figure below:

    Figure-10 CWE official website Vulnerability description page

Mapping Questions

Map Currency Indication <CR_6.1>

Describe how and where your capability indicates the most recent CWE content used to create or update its mappings (required):

Users can view CWE through the product homepage (click the help button in the upper right corner, as shown in Figure 11 and 12

Figure 11.

Figure 12.

Map Currency Update Approach <CR_6.2>

Indicate how often you plan on updating the mappings to reflect the current CWE content and describe your approach to keeping reasonably current with the CWE content when mapping them to your repository (recommended):

We download the component's CWE vulnerability in real time every day and update it to the local database. We release our products 4 times a year, and each release will update the CWE content.

MAP CURRENCY UPDATE TIME <CR_6.3>

Describe how and where you explain to your customers the timeframe they should expect an update of your capability’s mappings to reflect newly available CWE content (required):

We release our product 4 times every year. The user can get updated mapping relations in each release

Documentation Questions

CWE AND COMPATIBILITY DOCUMENTATION <CR_5.1>

Provide a copy, or directions to its location, of where your documentation describes CWE and CWE compatibility for your customers (required):

Our CWE Documentation describes CWE and CWE compatibility at the beginning of the article as part (I) and part (II), by quoting the description of CWE and CWE compatibility on the CWE official website. Users can view CWE through the product homepage, and click the help button in the upper right corner to view CWE mapping relations file, as shown in Figure 11 and figure 12.

DOCUMENTATION OF FINDING ELEMENTS USING CWE IDENTIFIERS <CR_5.2>

Provide a copy, or directions to its location, of where your documentation describes the specific details of how your customers can use CWE identifiers to find the individual security elements within your capability’s repository (required):

The user can search for the CWE identity by applying the "vulnerability library" function on the home page to locate the corresponding vulnerability and description. The figure is shown as follows.

Figure 13.

DOCUMENTATION OF FINDING CWE IDENTIFIERS USING ELEMENTS <CR_5.3>

Provide a copy, or directions to its location, of where your documentation describes the process a user would follow to find the CWE identifiers associated with individual security elements within your capability’s repository (required):

  1. Click the number hyperlink in the "component name" column to view the details of the vulnerabilities in the current component. The "Vulnerability Type" in the component vulnerability list shows the correspondence between the current vulnerabilities and CWE vulnerabilities. If it can exactly match the CWE vulnerabilities, then Display the CWE vulnerability number in the current list, as shown in the figure below:

    Figure-14 Component specific vulnerability list

  2. Click on the CWE number hyperlink to view the vulnerability details

    Figure-15 A list of vulnerabilities in a certain component

  3. Click on the CWE number hyperlink in the figure above, and the page jumps to the description page of the CWE official website describing the current vulnerability, as shown in the following figure below:

    Figure-16 CWE official website Vulnerability description page

DOCUMENTATION INDEXING OF CWE-RELATED MATERIAL <CR_5.4>

If your documentation includes an index, provide a copy of the items and resources that you have listed under "CWE" in your index. Alternately, provide directions to where these "CWE" items are posted on your web site (recommended):

Refer to <CR_2.4>, users can download the CWE Compatibility Manual.

Type-Specific Capability Questions

Tool Questions

FINDING TASKS USING CWE IDENTIFIERS <CR_A.2.1>

Give detailed examples and explanations of how a user can locate tasks in the tool by looking for their associated CWE identifier (required):

The user can log in to the SCA system with the login information received, as shown in Figure 13.

Figure 17.

Users can click “create a project” on the Project List page of the application to automatically analyze the known vulnerabilities included in the project:

Figure 18 Creating projects

Figure 19 Creating version

After the system detection is completed, the total number of project vulnerabilities is visible in the “All Vulnerabilities” column of the current project list, as shown in the following figure

Figure-20 Project test results

Click the project name to enter the version list and display the vulnerability distribution of the version, as shown in the following figure:

Figure-21 All components used in the project and their number of vulnerabilities

Click the number hyperlink in the "component name" column to view the details of the vulnerabilities in the current component. The "Vulnerability Type" in the component vulnerability list shows the correspondence between the current vulnerabilities and CWE vulnerabilities. If it can exactly match the CWE vulnerabilities, then Display the CWE vulnerability number in the current list, as shown in the figure below:

Figure-22 Component specific vulnerability list

Click on the CWE number hyperlink to view the vulnerability details

Figure-23 A list of vulnerabilities in a certain component

FINDING CWE IDENTIFIERS USING ELEMENTS IN REPORTS <CR_A.2.2>

Give detailed examples and explanations of how, for reports that identify individual security elements, the tool allows the user to determine the associated CWE identifier for the individual security elements in the report (required):

After the detection, the user can search for the CWE identity by applying the "vulnerability list" function on the home page to locate the corresponding vulnerability and description. The figure is shown as follows:

Figure-24 CWE search in the context of Defect Results

GETTING A LIST OF CLAIMED CWE IDENTIFIER COVERAGE <CR_A.2.3>

Give detailed examples and explanations of how a user can obtain a listing of all of the CWE identifiers that the owner claims the tool is effective at locating in software (required):

Users can view CWE through the product homepage, and click the help button in the upper right corner to view CWE mapping relations file, as shown in Figure 11 and figure 12.

USING CCR TO PROVIDE CLAIMED CWE IDENTIFIER COVERAGE <CR_A.2.4>

Give a detailed explanation of how a user can find the Coverage Claim Representation (CCR) XML document with all of the CWE identifiers that the owner claims the tool is effective at locating in software (recommended):

Currently we do not provide CCR XML documentation.

GETTING A LIST OF CWE IDENTIFIERS ASSOCIATED WITH TASKS <CR_A.2.6>

Give detailed examples and explanations of how a user can obtain a listing of all of the CWE identifiers that are associated with the tool's tasks (recommended):

On the test result set page, the "CWE ID" column details the CWE identifier mapped to each open source component vulnerability. And the mapping relationship between each CVE tag and CWE tag will also be displayed on the detailed description page containing known open source component vulnerabilities.

Figure-25 Component specific vulnerability list

Click on the CWE number hyperlink to view the vulnerability details

Figure-26 A list of vulnerabilities in a certain component

SELECTING TASKS WITH A LIST OF CWE IDENTIFIERS <CR_A.2.7>

Describe the steps and format that a user would use to select a set of tasks by providing a file with a list of CWE identifiers (recommended):

Please refer to <CR_A.2.1>.

SELECTING TASKS USING INDIVIDUAL CWE IDENTIFIERS <CR_A.2.8>

Describe the steps that a user would follow to browse, select, and deselect a set of tasks for the tool by using individual CWE identifiers (recommended):

Please refer to <CR_A.2.1>.

NON-SUPPORT NOTIFICATION FOR A REQUESTED CWE IDENTIFIER <CR_A.2.9>

Provide a description of how the tool notifies the user that a task associated with a selected CWE identifier cannot be performed (recommended):

When you search a CWE ID but there is no result, the tool notifies the user that a task associated with a selected CWE identifier cannot be performed.

Figure 27.

Service Questions

SERVICE COVERAGE DETERMINATION USING CWE IDENTIFIERS <CR_A.3.1>

Give detailed examples and explanations of the different ways that a user can use CWE identifiers to find out which security elements are tested or detected by the service (i.e. by asking, by providing a list, by examining a coverage map, or by some other mechanism) (required):

  1. Check cwe vulnerability through detection component

    Figure-28 CWE search in the component

  2. View CWE vulnerabilities through the vulnerability list of the asset library in use

    Figure 29.

  3. Search CWE vulnerabilities through vulnerability library

    Figure 30.

FINDING CWE IDENTIFIERS IN SERVICE REPORTS USING ELEMENTS <CR_A.3.2>

Give detailed examples and explanations of how, for reports that identify individual security elements, the user can determine the associated CWE identifiers for the individual security elements in the report (required):

Click on the CWE number hyperlink in the figure above, and the page jumps to the description page of the CWE official website describing the current vulnerability, as shown in the following figure below:

Figure 31.

Figure 32.

GETTING A LIST OF CLAIMED CWE IDENTIFIER COVERAGE <CR_A.3.3>

Give detailed examples and explanations of how a user can obtain a listing of all of the CWE identifiers that the owner claims the service is effective at locating in software (required):

The user can search for the CWE identity by applying the "vulnerability library" function on the home page to locate the corresponding vulnerability and description. The figure is shown as follows.

Figure 33.

Online Capability Questions

FINDING ONLINE CAPABILITY TASKS USING CWE IDENTIFIERS <CR_A.4.1>

Give detailed examples and explanations of how a "find" or "search" function is available to the user to locate tasks in the online capability by looking for their associated CWE identifier or through an online mapping that links each element of the capability with its associated CWE identifier(s) (required):

Please refer to <CR_A.2.2>.

ONLINE CAPABILITY INTERFACE TEMPLATE USAGE <CR_A.4.1.1>

Provide a detailed description of how someone can use your "URL template" to interface to your capability's search function (recommended):

https://sca-uat.softsafe-tech.com/entry/login?redirect=%2Fsca

FINDING CWE IDENTIFIERS USING ONLINE CAPABILITY ELEMENTS <CR_A.4.2>

Give detailed examples and explanations of how, for reports that identify individual security elements, the online capability allows the user to determine the associated CWE identifiers for the individual security elements in the report (required):

Please refer to <CR_A.3.2>.

GETTING A LIST OF CLAIMED CWE IDENTIFIER COVERAGE <CR_A.4.3>

Give detailed examples and explanations of how a user can obtain a listing of all of the CWE identifiers that the owner claims the online capability’s repository covers (required):

Please refer to <CR_A.2.1>.

ONLINE CAPABILITY ELEMENT TO CWE IDENTIFIER MAPPING <CR_A.4.5>

If details for individual security elements are not provided, give examples and explanations of how a user can obtain a mapping that links each element with its associated CWE identifier(s), otherwise enter N/A (required):

We provide detailed information about CWE vulnerabilities. Users can also use the Vulnerability link of CWE,Click on the link in the figure above, and the page jumps to the description page of the CWE official website describing the current vulnerability, as shown in the following figure below

Figure 34.

Figure 35.

Media Questions

ELECTRONIC DOCUMENT FORMAT INFO <B.3.1>

Provide details about the different electronic document formats that you provide and describe how they can be searched for specific CWE-related text (required):

We provide reports in various formats, including Word, Excel,PDF,and SPDX v2.2. For example, users can search CWE-related text in the PDF report by pressing Ctrl+F and typing search words.

Figure 36.

A sample electronic report is as follows:

Figure 37.

ELECTRONIC DOCUMENT LISTING OF CWE IDENTIFIERS <CR_B.3.2>

If one of the capability’s standard electronic documents only lists security elements by their short names or titles provide example documents that demonstrate how the associated CWE identifiers are listed for each individual security element (required):

We list the mapping relationship in the form of a table, and the document format is PDF. Users can easily find the relevant CWE ID by searching component serial number or component keyword

Graphical User Interface (GUI) Questions

FINDING ELEMENTS USING CWE IDENTIFIERS THROUGH THE GUI <CR_B.4.1>

Give detailed examples and explanations of how the GUI provides a "find" or "search" function for the user to identify your capability’s elements by looking for their associated CWE identifier(s) (required):

Please refer to <CR_A.2.1>.

GUI ELEMENT TO CWE IDENTIFIER MAPPING <CR_B.4.2>

Briefly describe how the associated CWE identifiers are listed for the individual security elements or discuss how the user can use the mapping between CWE identifiers and the capability’s elements, also describe the format of the mapping (required):

Please refer to <CR_A.2.1>.

Questions for Signature

STATEMENT OF COMPATIBILITY <CR_2.11>

Have an authorized individual sign and date the following Compatibility Statement (required):

"As an authorized representative of my organization I agree that we will abide by all of the mandatory CWE Compatibility Requirements as well as all of the additional mandatory CWE Compatibility Requirements that are appropriate for our specific type of capability."

Name: Dan Lin

Title: Product Manager

STATEMENT OF ACCURACY <CR_3.4>

Have an authorized individual sign and date the following accuracy Statement (recommended):

"As an authorized representative of my organization and to the best of my knowledge, there are no errors in the mapping between our capability's Repository and the CWE identifiers our capability reports, and those CWE identifiers are as specific as possible within the available CWE repository."

Name: Dan Lin

Title: Product Manager

STATEMENT ON FALSE-POSITIVES AND FALSE-NEGATIVES <CR_B.2.10> and/or <CR_B.3.7>

FOR TOOLS AND SERVICES ONLY — Have an authorized individual sign and date the following statement about your tools efficiency in identification of security elements (required):

"As an authorized representative of my organization and to the best of my knowledge, normally when our capability reports a specific security element, it is generally correct and normally when an event occurs that is related to a specific security element our capability generally reports it."

Name: Dan Lin

Title: Product Manager

Page Last Updated: June 30, 2023