Flexera Software Vulnerability Research
Flexera Software Vulnerability Research is a vulnerability management tool. You can bring advisory, product, and security data from Flexera into Brinqa to facilitate a consolidated view of your attack surface, thus strengthening your cybersecurity posture.
This document details the information you must provide for the connector to authenticate with Flexera and how to obtain that information from Flexera. See create a data integration for step-by-step instructions on setting up the integration.
Required connection settings
When setting up a data integration, select Software Vulnerability Research from the Connector drop-down. If you cannot find the connector in the drop-down, make sure that you have installed it first. You must provide the following information to authenticate Flexera with Brinqa:
-
API URL: The Flexera API URL. The default URL is
https://api.app.secunia.com
. -
API token: The API token associated with the Flexera account, which must have permissions to log in to the API server and return data.
Generate a Flexera API token
For the Flexera connector to use the Software Vulnerability Research API, you must provide an API token. To generate an API token, follow these steps:
-
Log in to your organization's Flexera portal.
-
Navigate to Settings > API > Tokens.
-
Click Create.
Your new API token displays. Although you can return to this page to view the token, you should handle it with care by ensuring that it is stored in a secure location.
If you do not have permissions to generate a token, contact your Flexera administrator. For additional information, see Flexera documentation.
Additional settings
The Flexera connector contains additional options for specific configuration:
-
Page size: The maximum number of records to get per API request. The default setting is 100. It is not recommended to go over 100.
-
Parallel requests: The maximum number of parallel API requests. The default setting is 4.
-
Maximum retries: The maximum number of times that the integration attempts to connect to the Software Vulnerability Research API before giving up and reporting a failure. The default setting is 5.
-
Requests per minute: The maximum number of API requests per minute. The default setting is 1800. You can enter 0 to disable rate limiting.
Types of data to retrieve
The Flexera connector can retrieve the following types of data from the Software Vulnerability Research API:
Table 1: Data retrieved from Flexera
Connector Object | Required | Maps to Data Model |
---|---|---|
Advisory | Yes | Security Advisory |
Product | No | Not Mapped |
Product Release | Yes | Package |
Vendor | No | Not Mapped |
Vulnerability Definition | Yes | Vulnerability Definition |
The Flexera connector does not currently support operation options for the types of data it retrieves.
For detailed steps on how to view the data retrieved from Flexera in the Brinqa Platform, see How to view your data.
Attribute mappings
Expand the sections below to view the mappings between the source and the Brinqa data model attributes.
Advisory
Table 2: Advisory attribute mappings
Source Field Name | Maps to Attribute |
---|---|
AFFECTED_PRODUCTS | targets, Local variable |
CRITICALITY | severity, severityScore, sourceSeverityName |
cvss_vector, cvss3_vector | Use CVSS calculator |
DESCRIPTION | description |
IMPACT | Local variable |
MODIFIED_DATE | sourceLastModified |
ORIGINAL_ADVISORIES | Local variable |
REFERENCES | references |
RELEASE_DATE | publishedDate |
SOLUTION | recommendation |
SOLUTION_STATUS | Local variable |
SYS_ID | uid |
THREAT_SCORE | Local variable |
TITLE | name |
WHERE | Local variable |
ZERO_DAY | zeroDay |
Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models (UDM). They only exist on the source data model (SDM).
Use CVSS calculator indicates that the CVSS (Common Vulnerability Scoring System) vectors and scores aren't directly mapped to a specific attribute on the UDM. Instead, a specialized library calculates the CVSS scores from the provided CVSS vector strings.
Product Release
Table 3: Product Release attribute mappings
Source Field Name | Maps to Attribute |
---|---|
IS_EOL | Local variable |
NAME | name |
PRODUCT_ID | Local variable |
PRODUCT_NAME | Local variable |
PRODUCT_PAGE | Local variable |
RESEARCH_CREATED | sourceCreatedDate |
RESEARCH_UPDATED | sourceLastModified |
SYS_ID | uid |
TYPE | categories |
VENDOR_ID | Local variable |
VENDOR_NAME | Local variable |
VERSION | currentVersion |
Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models (UDM). They only exist on the source data model (SDM).
Vulnerability Definition
Table 4: Vulnerability Definition attribute mappings
Source Field Name | Maps to Attribute |
---|---|
ADVISORIES | Local variable |
AFFECTED_PRODUCTS | Local variable |
CVSS3_SCORE | Use CVSS calculator |
CVSS3_VECTOR | Use CVSS calculator |
CVSS_SCORE | Use CVSS calculator |
CVSS_VECTOR | Use CVSS calculator |
DESCRIPTION | description |
LAST_MODIFIED | sourceLastModified |
PUBLISHED_DATE | publishedDate |
REFERENCES | references |
SOLUTIONS | recommendation |
SOURCE | Local variable |
SYS_ID | uid |
THREAT_MALWARE | Local variable |
THREAT_RULES | Local variable |
THREAT_SCORE | Local variable |
TITLE | name |
TYPE | categories |
Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models (UDM). They only exist on the source data model (SDM).
Use CVSS calculator indicates that the CVSS (Common Vulnerability Scoring System) vectors and scores aren't directly mapped to a specific attribute on the UDM. Instead, a specialized library calculates the CVSS scores from the provided CVSS vector strings.
APIs
The Flexera connector uses the Software Vulnerability Research API. Specifically, it uses the following endpoints:
Table 5: Flexera API Endpoints
Connector Object | API Endpoint |
---|---|
Advisory | GET https://api.app.secunia.com/api/advisories GET https://api.app.secunia.com/api/advisories/{id} |
Product | GET https://api.app.secunia.com/api/products |
Product Release | GET https://api.app.secunia.com/api/product-releases |
Vendor | GET https://api.app.secunia.com/api/vendors |
Vulnerability Definition | GET https://api.app.secunia.com/api/advisories GET https://api.app.secunia.com/api/advisories/{id} |
Changelog
The Flexera connector has undergone the following changes:
3.0.4.1
- Added three new additional settings to help manage API throttling and optimize API call handling: Parallel requests, Maximum retries, and Requests per minute.
3.0.3
-
Changed the IS_EOL attribute type on the Product Release object from string to boolean.
-
Changed the SOURCE_SEVERITY attribute name on the Advisory object to SOURCE_SEVERITY_NAME.
-
Changed the VENDOR_NAME attribute type on the Product Release object from instant to string.
3.0.1
- Fixed an issue with CPE records.
3.0.0
- Initial Integration+ release.