Tanzu provides critical infrastructure for applications and application platforms. Tanzu works hard to build products that customers trust, and they depend on timely updates to vulnerabilities. This policy explains the processes followed by Tanzu product and security teams.
A top priority for Tanzu is to maintain the trust afforded to us by our customers. We recognize that unless our products meet high standards for security, customers will not be able to use them with confidence. To achieve this, the Tanzu Product Security Incident Response Team maintains a program to identify, respond to, and address vulnerabilities.
This publication documents our policies for addressing vulnerabilities in Tanzu Products, describes under what circumstances we will issue a CVE identifier and Tanzu Security Advisory. It explains how to report a vulnerability in Tanzu-maintained code, defines terminology used in our publications, documents our commitment to safe harbor practices, and provides information about how Tanzu processes vulnerabilities.
If you believe you have found a vulnerability in a Tanzu product or service, please let us know by sending a private email to [email protected] or by opening a support ticket. We suggest that you use encrypted email to submit your reports. Please be sure to contact your account team so they can assist in coordinating meetings as necessary with the Tanzu Security Team.
Tanzu follows responsible vulnerability disclosure guidelines, during which the researcher privately reports the newly discovered vulnerability in Tanzu’s products and services directly to Tanzu. This allows Tanzu to address the vulnerability in the impacted product and services before any party publicly discloses the vulnerability/exploit details. Tanzu may credit the researcher following responsible vulnerability disclosure guidelines for vulnerability discovery and reporting.
Tanzu response timelines are dependent upon several factors such as severity, complexity, impact, and product life cycle. Tanzu aims to publish fix or corrective actions to customers as follows:
If you are a Tanzu customer, we advise you to create a support request (SR) with the Broadcom Global Support Services team.
Tanzu publications use the industry-standard Common Vulnerability Scoring System (CVSS), in addition to qualitative severity terminology that aligns with FIRST standards.
Tanzu Qualitative Rating FIRST Qualitative Rating CVSS Score
Critical Critical 9.0 – 10.0
Important High 7.0 – 8.9
Moderate Medium 4.0 – 6.9
Low Low 0.1 – 3.9
None None 0.0
Note: The Tanzu qualitative rating may change and does not depend only on the CVSS scoring. The rating given to a specific vulnerability may change at the discretion of Tanzu's security team and our engineering triage process.
Tanzu uses VMware as an approved CVE Numbering Authority (CNA), VMware is authorized to assign CVE identifiers to vulnerabilities affecting products within our distinct, agreed upon scope.
VMware shall issue a Tanzu CVE identifier for a vulnerability when it meets all the following criteria:
Tanzu discloses vulnerabilities in Tanzu Security Advisories, may include the following information:
Keep up to date on the latest vulnerabilities
Tanzu Security Advisories (requires Registration/Login)
Cloud Foundry Weekly - Security Update "into the DMZ"
Vulnerabilities are discovered through customer or third party submissions to the Tanzu Security Response Center, or through internal tooling used by Tanzu: the Tanzu Vulnerability Service, or TVS. TVS enables Tanzu to track vulnerabilities and triage through its products, product components, and release lines that customers depend on.
Tanzu performs regular penetration tests on its products and services.
The vulnerability triage data is available to customers through Tanzu Security Advisories, Tanzu Telemetry reports, Tanzu Platform Vulnerability Insights (upcoming release), Product Release notes (e.g. available at VMware Tanzu® Platform for Cloud Foundry), or custom reports generated by Tanzu Security and your Tanzu Account Team.
Tanzu aims to address software vulnerabilities, including reports from the How to Report Vulnerabilities section above, and to provide updates to customers in the shortest commercially reasonable time. This can take place in the next GA or patch release, or for vulnerabilities deemed highly critical, work-arounds or patches will be available as fast as reasonably possible.
Every product is a collection of release artifacts. For example, Tanzu Platform for Cloud Foundry has multiple Buildpacks and Diego cells, plus CredHub, BOSH, Tanzu Operations Manager, UAA, Cloud Controller, etc. Each of these components is included in a release artifact and every component has an associated SBOM that makes up the inventory of every component build.
Tanzu aims to continuously scan SBOMs for all supported product lines. Any CVEs identified result in internal tickets in the product ticketing system. Tanzu engineering teams review the tickets and update the vulnerable dependencies, or document the triage status for vulnerabilities following the CycloneDX analysis specification, as detailed in the next section.
When a component team updates a product component dependency and create a new build that resolves a vulnerability, TVS will process the new build SBOM and automatically close the ticket, documenting in the CycloneDX analysis section that the vulnerability was resolved.
Triage data is entered using the CycloneDX specification for vulnerability analysis.
An abbreviated guide to the CycloneDX triage state used by Tanzu and the associated values is provided below.
State:
"in_triage"
"resolved"
"exploitable"
"false_positive"
exploitable: "not_affected"
Justification:
"code_not_present"
"code_not_reachable"
"requires_configuration"
"requires_dependency"
"requires_environment"
"protected_by_compiler"
"protected_at_runtime"
"protected_at_perimeter"
"protected_by_mitigating_control"
Response / Detail (Notes):
The Detail or Notes string will document any workarounds or details regarding the status, or other information relevant to the vulnerability.
"can_not_fix"
"will_not_fix"
Many familiar words in the software vulnerability domain are overloaded, so our team uses some very specific terms to describe the concepts involved in the triage process.
“Release Artifacts” are the versioned components that make up a product. In almost all cases in Tanzu Platform for Cloud Foundry, these are BOSH releases. The system assumes that each release artifact version represents a unique set of bits.
A product is any versioned collection of release artifacts that ship together. In the case of TPCF, products are generally one-to-one with software that is shipped to customers e.g. TPCF, the MySQL tile, etc.
A product line is the name we use to refer to the set of patch versions for a given major.minor semver line. e.g., 10.0.x is a Tanzu Platform for Cloud Foundry product line that includes 10.0.1, 10.0.2, and so on.
GA Release or “Generally Available” Release is the term is used to refer to any officially released patch version in a product line e.g. 6.0.5 is currently the most recent GA Release for the Tanzu Application Service 6.0.x product line.
SBOM is an acronym for “Software Bill of Materials,” and is technically an inventory of components that make up a software release. However, in the Tanzu Platform for Cloud Foundry system, it is used casually to refer to CycloneDX JSON-format documents that contain both inventory and vulnerabilities, and which affect analysis for those vulnerabilities. This is not an uncommon usage, but is mentioned here to prevent confusion, especially for those who understand SBOMs to only contain an inventory.
Similarly, triage is commonly used to describe the data that results from an analysis of a vulnerability’s impact, whereas it might be more proper to use the word triage to describe the act of assembling that impact analysis.