Vulnerability Response and Disclosure Process
1. Receive
Monitor and promptly assign received vulnerabilities
2. Verify
Verify the vulnerability and confirm the exploitability and impact
3. Develop Solution
Provide effective solutions or risk remediation measures
4. Confirm Scope
Investigate and confirm the scope of affected products
5. Release Security Advisory
Review and publish the security advisory (SA) for the vulnerability
Report Vulnerabilities
Please report any security vulnerabilities via email to:
The email should include at least the following information:
- Products and versions affected
- Description of potential vulnerability
- Information about known exploits
- Disclosure plans
Important Note
Although we encourage the investigation of potential security breaches, we cannot tolerate any activity that may interfere with legitimate users or violate applicable computer abuse, cyber security and data protection regulations. Therefore, the following activities are prohibited:
- Modification or destruction of data
- Service disruption or degradation, such as DoS
- Disclosure of personal, proprietary or financial information
Product Support Policy
We strive to provide continuous security updates for our products. The security updates generally include the latest patches, vulnerability fixes, and other security improvements. We will generally maintain security updates for at least five years from the launch date of a product. However, the security update situation may vary by product, so please pay attention to our announcements. We will regularly publish and update information about the security of Primare products on this page to help you check your device’s security updates.
Updates will be based on an OTA-update.