Technical Security Assurance
The Meari Product Security Incident Response Team (MEARI PSIRT) is responsible for receiving, handling, and publicly disclosing security vulnerabilities related to Meari products and solutions. It serves as the sole channel for the company to disclose vulnerability information for its products and solutions. MEARI PSIRT has implemented a comprehensive vulnerability management process that complies with ISO27001, ISO27701, ISO27017, and ISO27018 standards and follows industry best practices to promptly address identified vulnerabilities.

Security Bulletin

Apache Log4j2 Remote Code Execution Vulnerability (CVE-2021-44228/CVE-2021-45046)

View Report
Security Technology
AES Encryption Algorithm: How Does It Work?2024-04-30
The Advanced Encryption Standard (AES), also known as the Rijndael algorithm, is currently the leading symmetric encryption algorithm internationally. AES falls under the category of block cipher algorithms within symmetric encryption algorithms.
What is a Symmetric Encryption Algorithm?2024-03-20
In the modern phase of cryptography, the concept of key confidentiality was introduced, giving rise to a new encryption algorithm paradigm known as the symmetric encryption algorithm.
Report a Vulnerability
1. Vulnerability Submission
We encourage users, partners, suppliers, security agencies, and independent researchers to proactively report any security risks or vulnerabilities related to MEARI products and solutions to the Meari PSIRT via email. Click the "Submit Vulnerability" button or send vulnerability information to msg@meari.com.cn.
2. Email Submission Details(To facilitate timely verification and pinpointing of the vulnerability, the email should include the following information)
1.Organization / Title and Contact Information. 2.Description of the Potential Security Risk / Vulnerability. 3.Technical Details (e.g., system configuration, identification method, vulnerability description/screenshots, sample captured images, proof of concept (POC), steps to reproduce the issue, etc). 4.Product Name, Model, and Software/Firmware Version of the Reported Security Risk/Vulnerability. 5.Possible Vulnerability Disclosure Plan.
How We Address Vulnerabilities
Meari PSIRT strictly controls the scope of vulnerability information, limiting access to only those directly involved in addressing the issue. Additionally, all individuals with access to this information are required to maintain confidentiality regarding the vulnerability until it is publicly disclosed.
Meari PSIRT discloses security vulnerabilities in the following two forms:
1.SA (Security Advisory): Publishes information related to security vulnerabilities in Meari products and solutions, including but not limited to vulnerability descriptions and remediation measures. 2.SN (Security Notification): Addresses security topics related to Meari products and solutions, including but not limited to vulnerabilities and security incidents.
Meari PSIRT adopts the CVSSv3 standard, providing a base score and temporal score for each security vulnerability assessment. Customers may also create their own environmental scores based on their specific needs. For details on the specific CVSSv3 standard, please visit this link: https://www.first.org/cvss/specification-document
Our Vulnerability Handling Process
1.ReceiptReceiving and gathering reports of potential product security vulnerabilities
2.VerificationCoordinating with relevant teams to verify the vulnerability and conduct a risk assessment
3.RemediationAnalyzing the root cause of the vulnerability and implementing a fix
4.DisclosureProactively disclose vulnerability information and release fixed firmware
5.ImprovementEnhance vulnerability scanning capabilities and integrate them into product security requirements