Security strategy

Public feedback interface

Security researchers can notify iEAST of security vulnerabilities in devices.

iEAST official website: https://ieast.audio

Contact of iEAST support department support@ieast.net

When any vulnerability is identified, update the firmware as follows:

  1. Vulnerabilities identified by customers, users, etc.
  2. A security related review meeting must be held immediately and the corresponding solution needs to be presented. In particular, participants must include security technology manager, project development manager, firmware architecture manager, and Technical Director. CVSSv2 will be used as a reference standard for assessing and prioritizing vulnerability.
  3. According to the solution, the developer performs the specific implementation.
  4. Code review. Reviewers should include security technology manager and project development.
  5. Release firmware.
  6. QA team test the firmware. If there are any problems, go back to step three.
  7. Code merged into trunk branch.
  8. The project manager notify customers that they need to update the software and get customer’s upgrade confirmation.
  9. Perform OTA on the corresponding project.

© 2024 iEAST(International) Limited