Answers to common questions about the Vulnerability Catalog — an educational showcase of the Russian Scanner-VS 7 by JSC “Echelon Technologies”.
About the Platform
What is the Vulnerability Catalog?
The Vulnerability Catalog vulnerabilities.etecs.ru
is a free educational platform demonstrating the capabilities of
the Russian comprehensive security analysis system Scanner-VS 7. The platform provides the cybersecurity community
with access to a normalized vulnerability database for research and educational purposes.
How is it different from other vulnerability catalogs?
Unique Features:
- Russian Origin — developed by JSC “Echelon Technologies” considering domestic IT infrastructure specifics
- Normalized Data — aggregation from multiple sources, including FSTEC Russia BDU
- Professional Analysis — using the same algorithms as the commercial Scanner-VS 7
- Educational Mission — providing free access to quality data for learning
- Technology Demonstration — showcase of full-featured system capabilities
Who can use the catalog?
Target Audience:
- Information Security Specialists — for researching current threats
- IT Administrators — for planning updates and protective measures
- Students and Educators — for learning modern threat analysis methodologies
- Security Researchers — for analyzing attack vectors and trends
- Organization Representatives — for assessing professional solution needs
Technical Questions
How often is data updated in the catalog?
Update Frequency:
- EPSS scores — daily, based on current threat intelligence data
- CVE records — real-time when appearing in sources
- FSTEC BDU — synchronization with official publications
- Metadata — regular enrichment with additional information
The same update infrastructure is used in the commercial Scanner-VS 7, ensuring data currency for industrial use.
What data sources are used?
Russian Sources:
- FSTEC Russia BDU — official Russian vulnerability database
- Domestic OS vulnerability databases — Astra Linux SE, RED OS, Alt Linux
International Sources:
- NIST National Vulnerability Database — leading global CVE database
- FIRST.org EPSS — vulnerability exploitation prediction system
- Operating Systems — Debian, Red Hat, Ubuntu, Windows, Arch Linux
- Commercial Products — major software vendor databases
What about RED OS and Astra Linux security bulletins?
RED OS Security Bulletins:
- In accordance with FSTEC Russia requirements, RED OS ensures continuous vulnerability search, develops security updates and compensatory measures to prevent vulnerability exploitation.
- Licensees of the certified RED OS edition must apply published updates to ensure security and neutralize vulnerability threats.
Astra Linux Special Edition OS Security Bulletins:
- Licensees using Astra Linux Special Edition OS, certified according to FSTEC Russia information security requirements (certificate № 2557), must apply the methodologies and software updates published in security bulletins to neutralize vulnerability threats in information systems.
What’s the difference between CVSS and EPSS scores?
CVSS (Common Vulnerability Scoring System):
- Purpose — measuring potential vulnerability impact
- Range — from 0.0 to 10.0 (higher means more severe)
- Nature — static assessment of technical characteristics
- Focus — maximum possible damage when exploited
EPSS (Exploit Prediction Scoring System):
- Purpose — predicting exploitation probability in real conditions
- Range — from 0.0 to 1.0 (0-100% probability)
- Nature — dynamic assessment based on threat intelligence
- Focus — real threat in current threat landscape
Comprehensive Approach: For effective prioritization, both metrics are recommended: CVSS shows potential damage, EPSS shows threat realization probability.
How to interpret color coding?
CVSS Severity (impact severity):
- 🔴 Critical (9.0-10.0) — catastrophic impact, immediate measures
- 🟠 High (7.0-8.9) — serious impact, priority remediation
- 🟡 Medium (4.0-6.9) — moderate impact, planned measures
- 🟢 Low (0.1-3.9) — limited impact, background monitoring
- ⚪ None (0.0) — informational messages
EPSS Probability (exploitation probability):
- 🔴 Critical (0.8-1.0) — 80-100% attack probability in next 30 days
- 🟠 High (0.6-0.8) — 60-80% exploitation probability
- 🟡 Medium (0.4-0.6) — 40-60% usage probability
- 🟢 Low (0.2-0.4) — 20-40% attack probability
- ⚪ Minimal (0.0-0.2) — 0-20% exploitation probability
Usage and Limitations
Can the catalog be used for commercial purposes?
Educational Use: The catalog is intended for educational, research, and familiarization purposes. You can freely use the platform for:
- Learning vulnerability analysis methodologies
- Researching cybersecurity trends
- Assessing data quality and analysis approaches
- Training teams in modern information security practices
Commercial Use: For production use in commercial organizations, Scanner-VS 7 is recommended, which provides:
- Automated IT infrastructure scanning
- Technical support SLA
- Regulatory compliance
- Professional reporting capabilities
What are the limitations of the educational platform?
Functional Limitations:
- Data viewing only — no infrastructure scanning capability
- No personalization — public information without asset linking
- Limited analytics — basic filters and search
- No technical support — community and documentation for help
What’s not in the catalog:
- Automatic vulnerability detection in systems
- Security configuration analysis
- Password and account auditing
- SIEM and other information security system integration
- Personalized remediation recommendations
How to prioritize vulnerabilities for patching?
Recommended Methodology:
1. Critical Priority (24 hours):
- CVSS ≥ 9.0 + EPSS ≥ 0.8 + available exploits
- Publicly accessible systems with critical vulnerabilities
- Absence of compensating controls
2. High Priority (7 days):
- CVSS 7.0-8.9 + EPSS ≥ 0.6
- Widely used technologies
- Presence of proof-of-concept exploits
3. Medium Priority (30 days):
- CVSS 4.0-6.9 + EPSS 0.3-0.6
- Specialized systems
- Theoretical attack vectors
Environment Context Consideration:
- Protected asset criticality
- System network accessibility
- Existing protective measures
- Patch implementation complexity
About the Commercial Product
What is Scanner-VS 7?
Scanner-VS 7 is a server-based comprehensive security analysis system developed by JSC “Echelon Technologies” for professional use in organizations.
Key Capabilities:
- Automated scanning of IT infrastructure for vulnerabilities
- Security configuration analysis
- Password dictionary auditing
- Continuous security monitoring
- Detailed reporting for various management levels
What are the advantages of the commercial version?
Technical Advantages:
- ⚡ Rapid Deployment — 1-minute system installation
- 💾 Minimal Requirements — 2 GB RAM, 2 CPU cores
- 🔍 High Accuracy — minimal false positives
- 📊 Comprehensive Analytics — deep risk analysis
Standards Compliance:
- 🛡️ FSTEC Russia Certificate №2204 (4UD, TU) for Scanner-VS 6 version, Scanner-VS 7 certificate expected in 2025
- 🇷🇺 Domestic OS Support — Astra Linux SE, RED OS, Alt Linux
- 🌐 International Compatibility — Windows, Ubuntu, RedHat, CentOS
- 📦 Container Execution — Docker, Podman, Kubernetes
Operational Advantages:
- Vulnerability management process automation
- Integration with existing information security systems
- Professional technical support
- Regular database and functionality updates
Who is Scanner-VS 7 suitable for?
Organization Types:
- Government Agencies — FSTEC and FSB requirement compliance
- Commercial Enterprises — business-critical system protection
- Financial Organizations — industry standards compliance
- Industrial Enterprises — production system protection
- Educational Institutions — campus cybersecurity assurance
Necessity Criteria:
- Critical IT infrastructure presence
- Regulator compliance requirements
- Need for information security process automation
- Professional technical support necessity
Support and Community
Where to get help using the catalog?
Available Resources:
- Documentation — comprehensive guide to all capabilities
- Training Materials — practical examples and cases
- FAQ — answers to common questions
For Advanced Questions:
- Reference to Scanner-VS 7 documentation
- Consultations with JSC “Echelon Technologies” technical specialists
Is the platform available in other languages?
Current Support:
- 🇷🇺 Russian — complete interface and documentation
- 🇺🇸 English — interface and main documentation
Language Features:
- Automatic preferred language detection
- Language switching at any time
- Language setting preservation between sessions
Is catalog development planned?
Current Development Directions:
- Vulnerability data source expansion
- Analytical capability improvements
- New educational material addition
- New Scanner-VS 7 capability demonstration
Feedback: We value user feedback for platform improvement and welcome your suggestions through JSC “Echelon Technologies” contacts.
Getting the Commercial Product
How to get Scanner-VS 7?
Commercial Inquiry Contacts:
- 📧 Email: partners@npo-echelon.ru
- 📞 Phone: 8 (495) 223-23-92
- 🏢 Address: 107023, Moscow, Elektrozavodskaya str., 24
- 🛠️ Tech Support: 8 (800) 100-05-02
Acquisition Process:
- Contact via provided contacts
- Requirements and tasks consultation
- System capability demonstration
- Commercial proposal preparation
- Pilot implementation and team training
Are demo versions or trial periods available?
Familiarization Opportunities:
- Vulnerability Catalog — demonstration of data quality and interface
- Demo Sessions — personal Scanner-VS 7 capability presentations
- Pilot Projects — testing in customer’s real environment
- Technical Consultation — specific requirement discussions
Contact our specialists to arrange a system capability demonstration in the context of your tasks.
What technical support is provided?
Scanner-VS 7 Support Levels:
- Basic Technical Support — included in license cost
- Extended Support — priority service
- Premium Support — 24⁄7 support for critical systems
Support Types:
- System usage consultations
- Technical problem resolution
- Security and functionality updates
- Specialist team training
JSC “Echelon Technologies” — Russian cybersecurity solution developer with over 20 years of experience creating information protection systems for government and commercial organizations.