
Hello, your privacy is important to us. Uniview websites use cookies to store info on your device and create the most secure and effective website . By continuing to use our websites, please accept the cookies could be stored on your device, which outlined our cookie policy and privacy policy .
Uniview has been authorized by the CVE Program as a CVE Numbering Authority(CNA). Uniview can assign CVE Identifiers (CVE IDs) to vulnerabilities found in its own products and firmware. This is the first step towards vulnerabilities disclosure, verification and solutions release, and the appointment will help speed up the problem-solving process for potential security risks.
CVE Tag Line:
§ The mission of the Common Vulnerabilities and Exposures (CVE™) Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
What is CVE?
§ CVE is an international, community-based effort and relies on the community to discover vulnerabilities. The vulnerabilities are discovered then assigned and published to the CVE List.
§ Partners publish CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to ensure they are discussing the same issue, and to coordinate their efforts to prioritize and address the vulnerabilities.
§ The CVE Records published in the catalog enable program stakeholders to rapidly discover and correlate vulnerability information used to protect systems against attacks.
§ The CVE List is built by CVE Numbering Authorities (CNAs). Every CVE Record added to the list is assigned by a CNA.
What are CNAs (CVE Numbering Authorities)
§ CNAs are organizations responsible for the regular assignment of CVE IDs to vulnerabilities, and for creating and publishing information about the Vulnerability in the associated CVE Record. Each CNA has a specific Scope of responsibility for vulnerability identification and publishing.
CVE Value:
§ CVE enables two or more people or tools to refer to a vulnerability and know they are talking about the same thing, resulting in significant time and cost savings.
CVE is Community Driven:
§ The CVE Program relies on the community to discover vulnerabilities. The vulnerabilities are discovered then assigned and published by organizations from around the world that have partnered with the CVE Program.
§ Partners publish CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to ensure they are discussing the same issue, and to coordinate their efforts to prioritize and address the vulnerabilities.
§ The CVE Board, which drives the direction of the CVE Program, consists of industry, academic, and government representatives from around the world.
§ CVE Working Groups develop the program’s policies (approved by the CVE Board) and are open to the community.