Skip to content

CAP Changelog

This is the list of version numbers of the Cryptosense Analyzer Platform and their deployment dates in SaaS at analyzer.cryptosense.com. Each version number is shown with a list of changes brought by that version.

22.05.8 - 2022-05-25

  • Update dependencies to secure versions. The security of CAP was not affected overall.
  • Fix stored XSS on the certificates details page. This vulnerability could be triggered through manipulated traces. No indication of attempted attacks were found, but if you have CAP on-premises, upgrading is highly recommended.

22.05.7 - 2022-05-24

  • Update dependencies to secure versions. The security of CAP was not affected overall.
  • Fix analysis of certain libssl traces.
  • Fix the analysis of Fermat attack on RSA to mark safe RSA keys as "Passed".

22.05.6 - 2022-05-19

  • Fix totalCount field for some connections in the GraphQL API (for example: ReportConnection in a Project).
  • Improve error message in the GraphQL API when the ID of a profile, project, trace or report can't be found by the server.

22.05.5 - 2022-05-06

  • Rules specific to the Host Scanner are no longer included in FIPS specific profiles.
  • Improved appearance of the organization certificate details page.
  • Fix analysis of certain certificate chains picked up by the host scanner.

22.05.4 - 2022-05-05

  • Maintenance release.

22.05.3 - 2022-05-04

  • Maintenance release.

22.05.2 - 2022-05-03

  • Maintenance release.

22.05.1 - 2022-05-03

  • Maintenance release.

22.05.0 - 2022-05-02

  • Add rule for Java applications: Psychic signatures (CVE-2022-21449).
  • Add rule for hosts and applications: Fermat attack on RSA (CVE-2022-26320).
  • Sanitize Venafi instance URL: a trailing slash no longer causes invalid links to be generated by CAP.
  • Add createdAt date field to trace and report types in GraphQL API.
  • Remove api field from project type in GraphQL API.
  • Add deleteReport mutation to GraphQL API.
  • Improve appearance of organization key details page.
  • Improve parsing of PKCS#11 usage traces.

22.04.3 - 2022-04-15

  • Improve performance of the organization keys page.

22.04.2 - 2022-04-14

  • Improve loading time for report keys page.

22.04.1 - 2022-04-14

  • New organization certificates tab.
  • New page to display details of a key at the organization level.
  • Fix broken link in trace upload tutorial
  • Fix keys tab filter to stop hiding keys of unknown length

22.04.0 - 2022-04-04

  • Existing projects are no longer tied to a specific type of trace and can now contain any type of trace allowed by the organization.

22.03.7 - 2022-03-31

  • Fix a bug that would appear when the wrong files are uploaded to recent projects.
  • Add a keptByFilters: Boolean parameter to ReportDone.instances field in the GraphQL API.

22.03.6 - 2022-03-18

  • Add "Cryptosense 2022" profiles for everyone.
  • Check if a profile can be deleted before asking the user for confirmation.

22.03.5 - 2022-03-16

  • Add Jira integration:
    • The link to a Jira instance can be configured in the "Integrations" tab.
    • Users can then export individual findings as Jira issues.
    • Findings can also be exported in batches.
  • Add a Host Scanner download button for users authorized to analyze host scans.
  • Improve performance of dashboards for key store statistics coming from newly generated host scanner reports. This doesn't affect performance for existing reports.
  • Improve report generation performance when the organization has a lot of keys.
  • Add "Date Uploaded" and "Uploaded By" to traces in the project "Traces" tab.
  • Fix rule and instance counts in report export printable view.

22.03.4 - 2022-03-09

  • Update text shown only to users of the free demo account.

22.03.3 - 2022-03-09

  • Maintenance release.

22.03.2 - 2002-03-08

  • Add 5 new application analysis rules related to post-quantum readiness. Those rules are disabled by default.
  • Add a new "Post Quantum Readiness" builtin profile using only the aforementioned rules

22.03.1 - 2022-03-04

  • Fix a bug where the severity of certificate digest findings in host scan reports was not set to low for self-signed certificates inside keystores.

22.03.0 - 2022-03-02

  • Fix potential database synchronization issues associated with the organization keys table and automated deletion of old reports.
  • Fix overflow of a table in the report print view.

22.02.4 - 2022-02-18

  • Add a completedAt: String field to the Report type in the GraphQL API.
  • Add a url: String field to the Instance type in the GraphQL API.

22.02.3 - 2022-02-16

  • Fix CSV export of findings: the file was empty for some types of reports.

22.02.2 - 2022-02-15

  • Add new application analysis rule: "Asymmetric key-transport key outside cryptoperiod".
  • Enforce the uniqueness of project names within each organization.
  • In host scan reports, set severity of certificate digest findings to low if the certificate is self-signed.

22.02.1 - 2022-02-08

  • Maintenance release.

22.02.0 - 2022-02-01

  • Add organization keys tab. This shows all keys found in reports generated from now on. To see keys from old reports, you will need to run them again.

22.01.4 - 2022-01-31

  • Add help tooltips for some certificate filters: "Self-signed" and "CA certificates".
  • Improve performance of the "Certificates" tabs in all analyzer reports.

22.01.3 - 2022-01-21

  • Fix database migration script.

22.01.2 - 2022-01-21

  • Add pagination information (page number and next/previous page links) to the bottom of paginated lists.
  • Fix serialization and parsing of some key metadata.

22.01.1 - 2022-01-14

  • Fix issue with the filters for self-signed and CA certificates that caused some certificates to be hidden.
  • Add filters for key lengths to the keys and certificates tabs.

22.01.0 - 2022-01-10

  • Hide the "has-private-key" attribute in the key detail page for symmetric keys.

21.12.2 - 2021-12-29

  • Improve the performance of the "Keys" tab in host scanner reports, especially when the database contains a large number of file entries.

21.12.1 - 2021-12-20

  • Add the following rules to Java analysis:
    • Invalid certificate
    • Certificate validity too long
  • Extract certificates from KeyStore.getCertificateChain calls in Java.
  • Show organization name on dashboard.

21.12.0 - 2021-12-13

  • Add filters for key file type in host scanner reports
  • Add filters for self-signed and CA certificates for Java and host scanner reports.
  • Operations are now ordered by last call
  • Include Host Scanner rules into tracer profiles
  • Display compatible APIs for rules on the profile page
  • Improve performance of the keys tab in host scan reports.
  • New projects are multi-type, they can handle multiple trace types at once and summarize them.

21.11.3 - 2021-11-26

  • Fix parsing of X.509 certificate extensions, which caused wrong interpretations of whether some certificates are CA certificates or not.

21.11.2 - 2021-11-25

  • On the certificate details page, show whether a certificate is self-signed or a CA certificate.
  • Added certificate expiration and stale key warning limits to the profile.

21.11.1 - 2021-11-18

  • Display file type in key information column for keys tab in host scan reports.
  • Fix bug where all key files in a host scan were categorized as SSH keys. Key files are now categorized as SSH, PGP, PKCS#8, etc.
  • Change location stats computation: previously it was counting instances; now it counts locations and the maximum severity per location.

21.11.0 - 2021-11-16

  • First numbered version.