Security Technology
AES Encryption Algorithm: How Does It Work?2024-04-30
The Advanced Encryption Standard (AES), also known as the Rijndael algorithm, is currently the leading symmetric encryption algorithm internationally. AES falls under the category of block cipher algorithms within symmetric encryption algorithms.
What is a Symmetric Encryption Algorithm?2024-03-20
In the modern phase of cryptography, the concept of key confidentiality was introduced, giving rise to a new encryption algorithm paradigm known as the symmetric encryption algorithm.
Report a Vulnerability
1. Vulnerability Submission
We encourage users, partners, suppliers, security agencies, and independent researchers to proactively report any security risks or vulnerabilities related to MEARI products and solutions to the Meari PSIRT via email. Click the "Submit Vulnerability" button or send vulnerability information to security@meari.com.cn.
2. Email Submission Details(To facilitate timely verification and pinpointing of the vulnerability, the email should include the following information)
1.Organization / Title and Contact Information. 2.Description of the Potential Security Risk / Vulnerability. 3.Technical Details (e.g., system configuration, identification method, vulnerability description/screenshots, sample captured images, proof of concept (POC), steps to reproduce the issue, etc). 4.Product Name, Model, and Software/Firmware Version of the Reported Security Risk/Vulnerability. 5.Possible Vulnerability Disclosure Plan.
How We Address Vulnerabilities
Meari PSIRT strictly controls the scope of vulnerability information, limiting access to only those directly involved in addressing the issue. Additionally, all individuals with access to this information are required to maintain confidentiality regarding the vulnerability until it is publicly disclosed.
Meari PSIRT discloses security vulnerabilities in the following two forms:
1.SA (Security Advisory): Publishes information related to security vulnerabilities in Meari products and solutions, including but not limited to vulnerability descriptions and remediation measures. 2.SN (Security Notification): Addresses security topics related to Meari products and solutions, including but not limited to vulnerabilities and security incidents.
Meari PSIRT adopts the CVSSv3 standard, providing a base score and temporal score for each security vulnerability assessment. Customers may also create their own environmental scores based on their specific needs. For details on the specific CVSSv3 standard, please visit this link: https://www.first.org/cvss/specification-document
Our Vulnerability Handling Process
1.ReceiptReceiving and gathering reports of potential product security vulnerabilities
2.VerificationCoordinating with relevant teams to verify the vulnerability and conduct a risk assessment
3.RemediationAnalyzing the root cause of the vulnerability and implementing a fix
4.DisclosureProactively disclose vulnerability information and release fixed firmware
5.ImprovementEnhance vulnerability scanning capabilities and integrate them into product security requirements