1 min read

China Sets Up New Worrying Vulnerability Disclosure Rules

Silviu STAHIE

July 20, 2021

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
China Sets Up New Worrying Vulnerability Disclosure Rules

The Cyberspace Administration of China (CAC) has published new guidelines regarding vulnerability disclosure rules, which should, in theory, offer some protection for companies affected by potential security problems, but raises serious security issues in practice.

Most of the new CAC guidelines follow common-sense rules, making it difficult for anyone to disagree with them. For example, they forbid organizations or individuals from collecting, selling or publishing vulnerabilities. They also give manufacturers time to fix problems.

“Network providers, network operators, and vulnerabilities collection platforms shall establish and improve vulnerabilities information receiving channels and keep them open, and keep vulnerabilities information receiving logs for no less than six months,” say the new guidelines.

Also, companies and people are forbidden from publishing tools or exploits that put devices and applications at risk, and network operators and vendors are encouraged to set up reward systems for reported vulnerabilities.

The problems appear with other requirements. From now on, all network operators and manufacturers have to register their vulnerability reporting platforms with the Ministry of Industry and Information Technology (MIIT).

Making matters worse, vendors have to share the discovered vulnerabilities within two days of reporting them, which in theory would give the ministry powerful tools. For example, numerous security researchers are based in China, reporting vulnerabilities through bug bounties set up in other parts of the world. Would those researchers have to report the same vulnerabilities to MIIT as well? It might prompt some platforms to reject vulnerability reporting coming from China.

The new rules take effect on Sept. 1. Only after that will the full extent of the regulation be apparent.

tags


Author



Right now

Top posts

What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach
Silviu STAHIE

August 09, 2022

1 min read
Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down
Silviu STAHIE

August 05, 2022

1 min read
Slope Wallets Blamed for $6 Million Solana Hack Slope Wallets Blamed for $6 Million Solana Hack
Silviu STAHIE

August 04, 2022

1 min read