This article outlines the correct procedure for reporting a security vulnerability that has been identified in a NetWitness product.
Reference
NetWitness Vulnerability Response Policy.
NetWitness strives to help our customers minimize risk associated with security vulnerabilities in our products. Our goal is to provide customers with timely information, guidance and mitigation options to address vulnerabilities. The RSA Product Security Incident Response Team (RSA PSIRT) is chartered and responsible for coordinating the response and disclosure for all product vulnerabilities that are reported to RSA.
NetWitness employs a rigorous process to continually evaluate and improve our vulnerability response practices and we regularly benchmark these against the rest of the industry.
How to Report a Security Vulnerability
If you identify a security vulnerability in any NetWitness product, please report it immediately. Timely identification of security vulnerabilities is critical to mitigating potential risks to our customers.
NetWitness customers and partners should contact the appropriate technical support team to report security issues discovered in an NetWitness product. The Technical Support team, the appropriate product team and RSA PSIRT will work together to address the issue and provide customers with next steps.
Security researchers, industry groups, vendors, and other users that do not have access to Technical Support should send vulnerability reports to RSA PSIRT via email (sro.support@netwitness.com).
When reporting a potential vulnerability please include as much of the below information as possible to help us better understand the nature and scope of the reported issue:
- Product name and version that contains the vulnerability
- Environment or system information under which the issue was reproduced (e.g. product model number, OS version etc.)
- Type and/or class of vulnerability (XSS, buffer overflow, RCE, etc.)
- Step-by-step instructions to reproduce the vulnerability
- Proof-of-concept or exploit code
- Potential impact of the vulnerability
Notes
For more information, refer to the
RSA Vulnerability Response Policy page on the rsa.com website.