Vulnerability Disclosure Policy

As a provider of cutting edge security software, and research, we take security issues very seriously and recognize the importance of privacy, security, and community involvement. As such, we are committed to addressing and reporting security issues through a coordinated and constructive approach designed to drive the greatest protection for technology users. Whether you’re a user of Contrast Security solutions, a software developer, or simply a security enthusiast, you’re an important part of this process.

 

Reporting security issues

If you believe you have discovered a vulnerability in a Contrast Security product or have a security incident to report, please contact us at security@contrastsecurity.com.

Once we have received a vulnerability report, Contrast Security takes a series of steps to address the issue:

  1. Contrast Security requests the reporter keep any communication regarding the vulnerability confidential.
  2. Contrast Security investigates and verifies the vulnerability.
  3. Contrast Security addresses the vulnerability and releases an update or patch to the software. If for some reason this cannot be done quickly or at all, Contrast Security will provide information on recommended mitigations.
  4. Contrast Security publicly announces the vulnerability in the release notes of the update.Contrast Security may also issue additional public announcements, for example via social media, our blog, and media.
  5. Release notes (and blog posts when issued) include a reference to the person/people who reported the vulnerability, unless the reporter(s) would prefer to stay anonymous.

Contrast Security will endeavor to keep the reporter apprised of every step in this process as it occurs.

We greatly appreciate the efforts of security researchers and discoverers who share information on security issues with us, giving us a chance to improve our products and services, and better protect our customers. Thank you for working with us through the above process.

 

Coordination is key

When properly notified of legitimate issues, we’ll do our best to acknowledge your emailed report, assign resources to investigate the issue, and fix potential problems as quickly as possible. When we discover vulnerabilities through our own research, we will do our best to coordinate efforts with the vendor's security teams and CERT/CC.

 

Security issues found by Contrast Security research

Once we have found a vulnerability in another vendor’s products, Contrast Security takes a series of steps to address the issue:

  1. Contrast Security will keep any communication confidential regarding the vulnerability until the completion of the disclosure process.
  2. Contrast Security will attempt to contact the appropriate product vendor by email and telephone.
  3. Contrast Security will provide the vulnerability details to the vendor.
  4. Contrast Security will send a notification to CERT/CC 15 days after the first attempt at contacting the vendor.
  5. In keeping with CERT/CC's 45-day disclosure policy, Contrast Security and CERT/CC will prepare and publish an advisory detailing the vulnerability at least 60 days after initial attempts at disclosure at stage #2 above, barring extenuating circumstances. This advisory will be made available to the general public via Contrast Security’s blog and social media. It is likely there may also be some media interest, depending on the details of the findings.

For the latest news, research, and developments from Contrast Security on security, research, and projects visit our blog.