How we prevent vulnerabilities

Ogma is scanned continuously for vulnerabilities both in our code and in third-party dependencies using static code analysis tools and dependency scanning tools.

How we handle new vulnerabilities

When a security vulnerability is discovered in Ogma:

  1. We launch an internal task-force to evaluate the impact of the vulnerability and define its severity (see Severity levels).
  2. If the severity level of the vulnerability is high or critical, we publish a vulnerability report in our online vulnerability list. The report that we publish is updated continuously. It contains assessment, workaround and mitigation instructions.
    • For critical severity: a report is published within 2 working days
    • For high severity: a report is published within 10 working days
  3. If the severity is critical, we notify all potentially impacted customers by e-mail as soon as the report is published.
  4. We publish a software patch. Customers are notified by e-mail as soon as the patch is available.

Severity levels

Our vulnerability reports include a severity level. This severity level is based on our self-calculated CVSS score (Common Vulnerability Scoring System) for each specific vulnerability. CVSS is an industry standard vulnerability metric (learn more about CVSS).

For CVSS v3, we use the following severity rating system:

CVSS v3 score range Report severity level
0.1 - 3.9 Low
4.0 - 6.9 Medium
7.0 - 8.9 High
9.0 - 10.0 Critical

Below are a few examples of vulnerabilities which may result in a given severity level. Please keep in mind that this rating does not take into account details of your installation and are to be used as a guide only.

Severity Level: Critical

Critical severity vulnerabilities usually have most of the following characteristics:

For critical vulnerabilities, it is advised that customers patch or upgrade as soon as possible, unless you have other mitigating measures in place. For example, a mitigating factor could be if your installation is not accessible from the Internet.

Severity Level: High

High severity vulnerabilities usually have some of the following characteristics:

Severity Level: Medium

Medium severity vulnerabilities usually have some of the following characteristics:

Severity Level: Low

Low severity vulnerabilities typically have very little impact on an organization's business. Exploitation of such vulnerabilities usually requires local or physical system access. Vulnerabilities in third party code that are unreachable from Ogma's code may be downgraded to low severity.

Reporting a vulnerability

If you have discovered an unknown security vulnerability in Ogma, please get in touch with us via email: