top of page


  • Philip Osadebay - Tech Journalist

Chinese authorities demand that tech companies disclose their weaknesses, making spying easy

In recent years, China has been tightening its grip on tech companies operating within its borders requesting the disclosure of information about unpatched vulnerabilities. This practice has gained attention for its potential implications in state-sponsored hacking activities. The China's 2021 law, known as the "Regulations on the Management of Network Product Security Vulnerabilities," states how companies and security researchers handle security flaws in technology products on Chinese soil.

The aforementioned law compels companies operating in China to report software vulnerabilities, those exploitable code flaws to the Ministry of Industry and Information Technology within 48 hours of discovery. Furthermore, researchers are prohibited from publicly disclosing these vulnerabilities until a patch is available, unless both the product owner and the Ministry reach an agreement. The identified vulnerabilities are cataloged in the National Vulnerability Database, officially referred to as the National Computer Network Emergency Response Technical Teams/Coordination Center (CNCERT/CC).

China's motive appears to be safeguarding its information networks, concerns arise when considering the potential exploitation of unpatched vulnerabilities for state-sponsored hacking endeavours.

By complying with these new regulations and disclosing vulnerabilities to Chinese authorities prior to patching them, tech companies indirectly provide an opportunity for Beijing's agents to infiltrate both the product and its users, irrespective of their global location. In essence, the National Vulnerability Database becomes a treasure of exploitable vulnerabilities.

The implications of these developments extend beyond cybersecurity concerns, potentially intensifying the already strained relations between the United States and China over cyber-espionage. Recent revelations such as Chinese hackers acquiring a cryptographic key that granted access to the email accounts of numerous US organisations, including the State Department and the Department of Commerce, underscore the seriousness of these geopolitical tensions.

In conclusion, China's stringent regulations on software vulnerabilities are raising significant concerns, both within its borders and on the global stage. As the digital landscape continues to evolve, the balance between information security and potential exploitation remains a critical issue to monitor closely.


bottom of page