Once a vulnerability is discovered, TA Triumph-Adler focuses on responding promptly and appropriately, including responding to customers based on security vulnerability information. PSIRT (*1) generally proceeds in the following four steps: (1) gathering and sharing security vulnerability information, (2) investigating security issues and analysing their impact on our products, (3) taking security measures against vulnerabilities, and (4) announcing to the public.
(1) Gathering and sharing security vulnerability information
TA Triumph-Adler checks security information using official open databases of vulnerability information such as CVE, JPCERT and gathers security information from the press, such as newspapers and the Internet. More information is also provided by contacting the customer’s nearest sales company or by inter-office members.
CVE: Common Vulnerabilities and Exposures JPCERT: Japan Computer Emergency Response Team
(2) Investigating security issues and analysing their impact on our products
We investigate and analyse the phenomenon’s effects when a vulnerability is exploited and the difficulty and conditions when a malicious attacker tries to exploit a vulnerability.
(3) Taking security measures against vulnerabilities
After the investigation and analysis, if the results indicate that there is an impact, the development division continues to prepare technical and operational measures, such as applying security patches.
(4) Announcing to the public
We announce our security measures on the TA Triumph-Adler website, the PSIRT contact window, sales companies, or a service person.
We value dialogue with vulnerability reporters, handle reported vulnerability information in good faith, and fulfil our responsibility by disclosing vulnerability information in a timely and appropriate manner.
Circumstances
The Vulnerability Disclosure Policy is applied to include the following circumstances:
- A potential vulnerability affecting products is disclosed to the public.
- A potential vulnerability existing in products is reported by an external third party.
- A vulnerability impacting released products is discovered internally.
Vulnerability Handling Scope
TA Triumph-Adler considers any individual issues caused by including some weakness in coding or configuration that leads to your vulnerable design are not our vulnerability. We value vulnerability information submitted by reporters. However, whether the reported vulnerability information applies to the vulnerability handling scope will be determined by TA Triumph-Adler PSIRT.