Dahuasecurity.comではCookieならびに類似のテクノロジーを使用しています。Dahuaでは、Webサイトを正常に機能させるために機能性Cookieが使用され、ユーザ体験を最適化するために分析Cookieが使用されています。当社Webサイト外で、サードパーティのCookieによってデータが収集される場合もあります。「 同意します」をクリックするか、このWebサイトの使用を継続すると、Cookieを設定し、それに含まれる個人データが処理されることに同意したと見なされます。Cookieの使用に関する 詳細情報。

Vulnerability Reporting

808
Product Security Incident Response Team (PSIRT hereafter) is an integral part of Dahua CyberSecurity Center (DHCC).

Dahua PSIRT is responsible for receiving, processing and disclosing Dahua product and solution related security vulnerability. It is the designated window to release information about Dahua product vulnerability. Dahua encourage end user, partner, supplier, government agency, industry association and independent researcher to report potential risk or vulnerability to PSIRT by email.

Security vulnerability is a weakness or defect in the design, implementation, operation or management of a system that can be exploited to breach system security policy (RFC4949).

Please direct the email to CyberSecurity@dahuatech.com. Owing to the sensitive nature of vulnerability information, we strongly suggest reporter to use our PGP public key (key ID 0xC6068E4B; PGP fingerprint: 6176 9A82 F67E A062 CA46 C19A C6DE A2F8 C606 8E4B) to encrypt the email content.

Please include at least the following information in the email
● Organization/name, means of contact
● Products or solutions and versions affected
● Description of the potential vulnerability
● Supporting technical details (such as system configuration, traces, description of exploit/screen capture, sample packet capture, proof of concept, steps to reproduce the issue)
● Information about known exploits
● Disclosure plans, if any