Vulnerability
Disclosure
Policy
Introduction
Hager Group follows a secure by design approach for its connected products and services.
This vulnerability disclosure policy is part of this approach. It describes how you can report cyber security and privacy vulnerabilities in Hager Group products and services. It also explains what we do after we receive your report.
Please read this policy fully before you report a vulnerability and always act in compliance with it.
We value your time and effort for reporting security vulnerabilities to keep our products safe and secure. However, we do not have a bug bounty program and we do not offer monetary rewards to reporters.
How to report a vulnerability?
If you believe you have found a vulnerability relating to one of our products, an associated application or service, or a Hager Group website, please submit a vulnerability report using the dedicated form below.
Please note that Hager Group internal infrastructure is out of scope.
Your report must contain the following information:
- Your email address and your name (optional) for coordination purposes. We will use the information you provide only to contact you and acknowledge you (if you agree). For further information, please see our privacy notice.
- The vulnerable assets and the configuration used to discover the vulnerability: information on the product, service or website that contains the vulnerability. For example: name, version, serial number, IP address, URL, etc.
- A description of the vulnerability and its possible impacts. If you can, please list the possible root causes to your findings.
- The steps to reproduce the vulnerability. This could be a list of steps or commends that we can use to verify and triage the vulnerability.