{"id":911,"date":"2023-05-19T23:06:57","date_gmt":"2023-05-20T03:06:57","guid":{"rendered":"https:\/\/ami2025dev.wpenginepowered.com\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/"},"modified":"2025-12-10T17:15:06","modified_gmt":"2025-12-10T17:15:06","slug":"ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities","status":"publish","type":"project","link":"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/","title":{"rendered":"AMI Partners with the CVE Program as a CNA to Catalog and Publicly Disclose Cybersecurity Vulnerabilities"},"content":{"rendered":"<p><strong>ATLANTA, GEORGIA<\/strong> &#8211; AMI has been authorized by the <a href=\"https:\/\/www.cve.org\/Media\/News\/item\/news\/2023\/05\/23\/AMI-Added-as-CNA\">Common Vulnerabilities and Exposures (CVE\u00ae) Program as a CVE Numbering Authority (CNA)<\/a>. This privilege will enable AMI to identify, define, catalog and publicly disclose cybersecurity vulnerabilities that affect AMI firmware and software products with greater transparency in the industry.<\/p>\n<p>\u201cWe look forward to partnering with the CVE Program as a CNA to publish CVE records and communicate vulnerabilities timely, with transparency around the world,\u201d says <strong><em>Samuel Cure, Chief Information Security Officer (CISO) at AMI<\/em><\/strong>. \u201cAMI will continue to partner with CVE Program and coordinate our efforts to help prioritize and address the vulnerabilities throughout the supply chain.\u201d<\/p>\n<p>Benefits to AMI customers and partners include the following:<\/p>\n<ul>\n<li>\n<ul>\n<li>\n<ul>\n<li>Greater commitment to cybersecurity throughout the supply chain<\/li>\n<li>More streamlined vulnerability disclosure processes<\/li>\n<li>Timely communication of vulnerability information across the industry<\/li>\n<li>Mature vulnerability management practices<\/li>\n<li>Full transparency of vulnerability information for issues affecting open-source products<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>About the CVE Program:<\/strong><br \/>The mission of the Common Vulnerabilities and Exposures (CVE\u00ae) Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There is one CVE Record for each vulnerability in the catalog. The vulnerabilities are discovered then assigned and published by organizations from around the world that have partnered with the CVE Program. Partners, called CNAs, publish CVE Records to communicate consistent descriptions of vulnerabilities. Information technology and cybersecurity professionals use CVE Records to ensure they are discussing the same issue and to coordinate their efforts to prioritize and address the vulnerabilities.<\/p>\n<p><em>CVE\u00ae is a registered trademark of the MITRE Corporation in the US and\/or elsewhere. All other trademarks and registered trademarks are the property of their respective owners.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ATLANTA, GEORGIA &#8211; AMI has been authorized by the Common Vulnerabilities and Exposures (CVE\u00ae) Program as a CVE Numbering Authority (CNA). This privilege will enable AMI to identify, define, catalog and publicly disclose cybersecurity vulnerabilities that affect AMI firmware and software products with greater transparency in the industry. \u201cWe look forward to partnering with the [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":912,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"project_category":[1500],"project_tag":[],"class_list":["post-911","project","type-project","status-publish","has-post-thumbnail","hentry","project_category-news","topics-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AMI Partners with the CVE Program as a CNA to Catalog and Publicly Disclose Cybersecurity Vulnerabilities - AMI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AMI Partners with the CVE Program as a CNA to Catalog and Publicly Disclose Cybersecurity Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"ATLANTA, GEORGIA &#8211; AMI has been authorized by the Common Vulnerabilities and Exposures (CVE\u00ae) Program as a CVE Numbering Authority (CNA). This privilege will enable AMI to identify, define, catalog and publicly disclose cybersecurity vulnerabilities that affect AMI firmware and software products with greater transparency in the industry. \u201cWe look forward to partnering with the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"AMI\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TheWorldRunsonAMI#\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T17:15:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ami.com\/wp-content\/uploads\/2023\/05\/close-up-of-woman-hacker-hands-at-keyboard-compute-2022-12-02-21-49-23-utc-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AMI_PR\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/\",\"url\":\"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/\",\"name\":\"AMI Partners with the CVE Program as a CNA to Catalog and Publicly Disclose Cybersecurity Vulnerabilities - AMI\",\"isPartOf\":{\"@id\":\"https:\/\/www.ami.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2023\/05\/close-up-of-woman-hacker-hands-at-keyboard-compute-2022-12-02-21-49-23-utc.jpg\",\"datePublished\":\"2023-05-20T03:06:57+00:00\",\"dateModified\":\"2025-12-10T17:15:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2023\/05\/close-up-of-woman-hacker-hands-at-keyboard-compute-2022-12-02-21-49-23-utc.jpg\",\"contentUrl\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2023\/05\/close-up-of-woman-hacker-hands-at-keyboard-compute-2022-12-02-21-49-23-utc.jpg\",\"width\":7952,\"height\":5304},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ami.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.ami.com\/project\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AMI Partners with the CVE Program as a CNA to Catalog and Publicly Disclose Cybersecurity Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ami.com\/#website\",\"url\":\"https:\/\/www.ami.com\/\",\"name\":\"AMI\",\"description\":\"Trusted Leader in UEFI, BMC &amp; Open-Source Firmware\",\"publisher\":{\"@id\":\"https:\/\/www.ami.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ami.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ami.com\/#organization\",\"name\":\"AMI\",\"url\":\"https:\/\/www.ami.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ami.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png\",\"contentUrl\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png\",\"width\":512,\"height\":512,\"caption\":\"AMI\"},\"image\":{\"@id\":\"https:\/\/www.ami.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TheWorldRunsonAMI#\",\"https:\/\/x.com\/AMI_PR\",\"https:\/\/www.linkedin.com\/company\/ami\",\"https:\/\/www.youtube.com\/c\/AMI_PR\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AMI Partners with the CVE Program as a CNA to Catalog and Publicly Disclose Cybersecurity Vulnerabilities - AMI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"AMI Partners with the CVE Program as a CNA to Catalog and Publicly Disclose Cybersecurity Vulnerabilities","og_description":"ATLANTA, GEORGIA &#8211; AMI has been authorized by the Common Vulnerabilities and Exposures (CVE\u00ae) Program as a CVE Numbering Authority (CNA). This privilege will enable AMI to identify, define, catalog and publicly disclose cybersecurity vulnerabilities that affect AMI firmware and software products with greater transparency in the industry. \u201cWe look forward to partnering with the [&hellip;]","og_url":"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/","og_site_name":"AMI","article_publisher":"https:\/\/www.facebook.com\/TheWorldRunsonAMI#","article_modified_time":"2025-12-10T17:15:06+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.ami.com\/wp-content\/uploads\/2023\/05\/close-up-of-woman-hacker-hands-at-keyboard-compute-2022-12-02-21-49-23-utc-1024x683.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@AMI_PR","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/","url":"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/","name":"AMI Partners with the CVE Program as a CNA to Catalog and Publicly Disclose Cybersecurity Vulnerabilities - AMI","isPartOf":{"@id":"https:\/\/www.ami.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ami.com\/wp-content\/uploads\/2023\/05\/close-up-of-woman-hacker-hands-at-keyboard-compute-2022-12-02-21-49-23-utc.jpg","datePublished":"2023-05-20T03:06:57+00:00","dateModified":"2025-12-10T17:15:06+00:00","breadcrumb":{"@id":"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/#primaryimage","url":"https:\/\/www.ami.com\/wp-content\/uploads\/2023\/05\/close-up-of-woman-hacker-hands-at-keyboard-compute-2022-12-02-21-49-23-utc.jpg","contentUrl":"https:\/\/www.ami.com\/wp-content\/uploads\/2023\/05\/close-up-of-woman-hacker-hands-at-keyboard-compute-2022-12-02-21-49-23-utc.jpg","width":7952,"height":5304},{"@type":"BreadcrumbList","@id":"https:\/\/www.ami.com\/resource\/ami-partners-with-the-cve-program-as-a-cna-to-catalog-and-publicly-disclose-cybersecurity-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ami.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.ami.com\/project\/"},{"@type":"ListItem","position":3,"name":"AMI Partners with the CVE Program as a CNA to Catalog and Publicly Disclose Cybersecurity Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.ami.com\/#website","url":"https:\/\/www.ami.com\/","name":"AMI","description":"Trusted Leader in UEFI, BMC &amp; Open-Source Firmware","publisher":{"@id":"https:\/\/www.ami.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ami.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ami.com\/#organization","name":"AMI","url":"https:\/\/www.ami.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ami.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png","contentUrl":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png","width":512,"height":512,"caption":"AMI"},"image":{"@id":"https:\/\/www.ami.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TheWorldRunsonAMI#","https:\/\/x.com\/AMI_PR","https:\/\/www.linkedin.com\/company\/ami","https:\/\/www.youtube.com\/c\/AMI_PR"]}]}},"_links":{"self":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project\/911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project"}],"about":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/types\/project"}],"author":[{"embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/comments?post=911"}],"version-history":[{"count":0,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project\/911\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/media\/912"}],"wp:attachment":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/media?parent=911"}],"wp:term":[{"taxonomy":"project_category","embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project_category?post=911"},{"taxonomy":"project_tag","embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project_tag?post=911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}