Last modified: July 17, 2024
The purpose of this policy is to balance the public’s need to be informed of security vulnerabilities with Phoenix Technologies’ need for time to respond effectively to the vulnerability. The final publication schedule will be based on the best interests of the community as a whole.
Phoenix Technologies follows a policy of coordinated disclosure in partnership with reporters (e.g., security researchers) who report discovered vulnerabilities to Phoenix and its partners.
When Phoenix receives a vulnerability report from a reporter, we start a dialog with them to help better understand the vulnerability so that we can understand the scope and begin to patch the reported vulnerability.
Disclosure is an important responsibility as a CNA (CVE Numbering Authority), and Phoenix works closely with reporters to decide how and when the vulnerability should be disclosed. If the vulnerability is a unique issue that Phoenix will own, as determined during code review, then Phoenix will reserve a CVE ID through the CVE organization.
Once Phoenix, the reporter, and relevant stakeholders (such as Phoenix’s partners who may be affected) all agree that the vulnerability can be published, Phoenix will prepare a statement to be posted on our security notifications page. If more time is needed to create and distribute patches to affected partners, Phoenix will coordinate with the reporter to extend the embargo until Phoenix’s partners have had a chance to apply relevant patches.
Reporters who report issues to Phoenix will be credited in our disclosure statement on our security notifications page, with attribution to the individual and/or the organization they represent.
Bug Bounties: Phoenix does not participate in any bug bounty programs.
Company
Partners
Market Segments
Firmware Expertise
Products + Solutions
Services + Support
Legal
Copyright © 2024 Phoenix Technologies Inc. All rights reserved | Privacy Policy | Terms of Use | Cookie Policy | Trademarks