Flashpoint VulnDB Action
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 1.0.0 |
Compatible with ThreatQ Versions | >= 5.29.0 |
ThreatQ TQO License Required | Yes |
Support Tier | ThreatQ Supported |
Introduction
The Flashpoint VulnDB Action integration leverages the Flashpoint VulnDB API to enrich CVE records with additional context, providing deeper insights into vulnerabilities.
Flashpoint’s VulnDB is a comprehensive vulnerability database designed to help organizations strengthen their risk management programs. It offers continuously updated intelligence, including vulnerabilities that may not be documented in other sources, and delivers timely alerts. By covering both end-user software and third-party libraries, VulnDB enables organizations to proactively identify and address security weaknesses across their IT environments.
The integration provides the following action:
- Flashpoint VulnDB CVE Enrichment - queries CVEs from the input collection against Flashpoint VulnDB
The integration is compatible with the following object types:
- Indicator
- Vulnerability
The integration enriches the following object types:
- Indicator
- Vulnerability
This action is intended for use with ThreatQ TDR Orchestrator (TQO). An active TQO license is required for this feature.
Prerequisites
- An active ThreatQ TDR Orchestrator (TQO) license.
- A ThreatQ data collection containing at least one of the following system objects:
- CVE (Indicator)
- Vulnerabilities with the name of a valid CVE ID
- A Flashpoint VulnDB License.
The VulnDB license is separate from Ignite & FP Tools ones.
- A Flashpoint VulnDB API Credentials.
The API Credentials key must have permissions to search for multiple CVEs.
Installation
Perform the following steps to install the integration:
The same steps can be used to upgrade the integration to a new version.
- Log into https://marketplace.threatq.com/.
- Locate and download the action zip file.
- Navigate to the integrations management page on your ThreatQ instance.
- Click on the Add New Integration button.
- Upload the zip file using one of the following methods:
- Drag and drop the file into the dialog box
- Select Click to Browse to locate the file on your local machine
ThreatQ will inform you if the action already exists and will require user confirmation before proceeding. ThreatQ will also warn if the new version contains changes to the user configuration. The new configurations will overwrite existing ones and require confirmation.
- The action will now be installed. You will still need to configure the action.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact Flashpoint to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the Actions option from the Category dropdown (optional).
- Click on the action entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Client ID Enter your Flashpoint VulnDB client ID to authenticate with the API. Client Secret Enter your client secret associated with the VulnDB client ID. Enable SSL Certificate Verification Enable this parameter if the action should validate the host-provided SSL certificate. Disable Proxies Enable this parameter if the action should not honor proxies set in the ThreatQ UI. CVE Context Filter Select the context used to enrich the CVEs. Options include: - Access Vector
- Access Complexity
- Authentication
- Confidentiality Impact
- Integrity Impact
- Availability Impact
- Base Score
- Affected Vendors
- Affected Products
Ingest Flashpoint Vulnerability Enable this parameter to ingest related Flashpoint vulnerabilities associated with the original CVEs. This parameter is enabled by default. Vulnerability Context Selection Select the context to apply to ingested Flashpoint Vulnerabilities. Options include: - Affected Vendors
- Affected Products
- Authors
- VulnDB Link
- Attack Type
- Location
- Impact
Objects per run Enter the maximum number of objects to process per-run. The default value is 500.
- Review any additional settings, make any changes if needed, and click on Save.
Actions
The following action is available:
Action | Description | Object Type | Object Subtype |
---|---|---|---|
Flashpoint VulnDB CVE Enrichment | Enriches indicators with Flashpoint VulnDB data. | Indicator, Vulnerability | CVE (Indicator) |
Flashpoint VulnDB CVE Enrichment
The Flashpoint VulnDB CVE Enrichment action queries CVEs contained in a Threat Library collection against Flashpoint VulnDB API. The CVEs are saved in ThreatQ as CVE type indicators or Vulnerabilities.
POST https://vulndb.flashpoint.io/api/v1/vulnerabilities/cve_search
Sample Response:
{
"results": [
{
"title": "VMware Multiple Products XHCI USB Controller...",
"description": "Multiple VMware products contain a use-after-free...",
"cve_id": "2020-4004",
"vendors": [{"vendor": {"name": "VMware"}}],
"products": [{"name": "VMware ESXi"}],
"authors": [{"name": "Tianwen Tang"}],
"cvss_metrics": [{"score": 4.6, "access_vector": "LOCAL"}]
}
]
}
ThreatQuotient provides the following default mapping for this action:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Published Date | Examples | Notes |
---|---|---|---|---|---|
.cvss_metrics[].cve_id | Indicator/Vulnerability.Value | CVE/Vulnerability | .cvss_metrics[].generated_on | CVE-2020-4004 | Prepended with CVE. Matches input collection type. |
.cvss_metrics[].access_vector | Indicator/Vulnerability.Attribute | CVSSv2 Access Vector | .cvss_metrics[].generated_on | LOCAL | User-configurable. Updatable. |
.products[].name | Indicator/Vulnerability.Attribute | Affected Product | .cvss_metrics[].generated_on | VMware ESXi | User-configurable. |
.vendors[].vendor.name | Indicator/Vulnerability.Attribute | Affected Vendor | .cvss_metrics[].generated_on | VMware | User-configurable. |
.title | Related Vulnerability.Value | Vulnerability | .vulndb_published_date | VMware Multiple Products XHCI... | Ingested if "Ingest Flashpoint Vulnerability" enabled. |
.authors[].name | Related Vulnerability.Attribute | Author | .vulndb_published_date | Tianwen Tang | User-configurable. |
Enriched Data
Object counts and action runtime are supplied as generalities only. Objects returned by Flashpoint may differ based on API credentials, dataset size, and system resources.
Metric | Result |
---|---|
Run Time | 3 minutes |
Indicators | 200 |
Indicator Attributes | 5,000 |
Change Log
- Version 1.0.0
- Initial release
PDF Guides
Document | ThreatQ Version |
---|---|
Flashpoint VulnDB Action Guide v1.0.0 | 5.29.0 or Greater |