EJBCA Third-party Vulnerability Management Statement
Purpose
To establish digital trust, Keyfactor EJBCA customers require EJBCA supply chain security to ensure security of EJBCA and the customer use cases supported by EJBCA.
Keyfactor is committed to maintaining a secure software supply chain for EJBCA through proactive monitoring and analysis of vulnerabilities in third-party components included in the EJBCA Container Set that may affect the security of EJBCA as a product and of customer deployments of EJBCA Container Set.
As part of every product release, we identify and evaluate vulnerabilities reported for third-party components included in the EJBCA Container Set.
This process ensures that dependencies used within the EJBCA environment are continuously monitored and appropriately mitigated.
Scope
Our third-party vulnerability management process applies to containers and the documented deployment methods distributed as part of the EJBCA Container Set, including:
The ejbca-ee, ejbca-ee-ra, and ejbca-ee-va containers
Third-party modules, system packages, and runtime libraries
Container base images and OS layers
The EJBCA Enterprise Edition Helm chart
This process focuses specifically on third-party Common Vulnerabilities and Exposures (CVEs) that could impact the EJBCA Container Set deployed in Kubernetes according to the product documentation.
For security issues identified and resolved in EJBCA’s proprietary product code and submitted as CVEs, refer to Archive of EJBCA security issues.
Process Summary
1. Automated Scanning
Prior to each release, all containers undergo automated scans to identify publicly known CVEs in third-party software.
Scans are performed using industry-recognized tools that rely on trusted vulnerability databases such as the NVD.
2. Review and Analysis
CVEs with a Common Vulnerability Scoring System (CVSS) base score of 4.0 or higher (Medium or above) are analyzed to determine whether they affect EJBCA deployed according to the product documentation for EJBCA Container Set deployment in a way where exploitation of the vulnerability is feasible in real-world customer conditions.
The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of software vulnerabilities. For more information, refer to Common Vulnerability Scoring System: Specification Document.
3. Remediation and Mitigation
Potential vulnerabilities related to third-party CVEs may be remediated either a through a documented statement on why a CVE is not exploitable in EJBCA as a product, a documented mitigation action, or availability of an upgraded EJBCA version that does not show the CVE in scans.
4. Customer Communication
Availability of new versions and relevant mitigation information is announced via the Keyfactor Support Portal and associated product documentation updates.
SBOM Availability
A detailed Software Bill of Materials (SBOM) is published for every version of the EJBCA Container Set, see EJBCA Software Bill of Materials (SBOM).
The SBOM lists all third-party components and versions included in the release, providing full transparency into the product’s dependency composition.
Vulnerability Analysis Report (VAR)
For each release, EJBCA produces a CVEs and vulnerability analysis for EJBCA Container Set summarizing:
Third-party CVEs identified during pre-release scanning, capturing CVEs publicly reported at least 15 days prior to EJBCA release.
EJBCA’s impact assessment and mitigation instructions, where applicable.
Any residual risks or pending actions.
The vulnerability analysis report is available to authorized customers within 30 days after each release on request.