Zákaznícka podpora:

+421 43 58 64 382
0
Obľúbené

HDS adheres to industry best practices in managing and responding to security vulnerabilities discovered in our products. However, there’s no way to guarantee that products and services delivered by HDS are entirely free from vulnerabilities. This is not unique to HDS, but rather a general condition for all software and services. What HDS can guarantee is that we will make a concerted effort at every stage of development to identify and mitigate potential vulnerabilities, thus minimizing the risk associated with deploying HDS products and services in customer environments.

HDS acknowledges that certain standard network protocols and services may have inherent weaknesses that could be exploited. While HDS does not take responsibility for these protocols and services, we do provide recommendations on how to reduce risks related to your HDS products, software and services.

Scope

The vulnerability management policy described in this document applies to all products ULTRA, HDS and software Molekula.

Commitment

HDS appreciates and encourages the efforts made by researchers in identifying and reporting vulnerabilities in HDS products, software and services. By following the responsible disclosure process, the HDS Cyber Security Team, to its best abilities, will respect the researcher’s interest through mutual collaboration and transparency throughout the disclosure process.

HDS expects researchers not to disclose vulnerabilities before a 90-day period or mutually agreed date and to perform vulnerability research within legal boundaries that would not cause harm, expose privacy, or compromise safety of HDS and its partners and customers.

Vulnerability management

HDS uses the same classification for third-party open-source components and HDS-specific vulnerabilities. Vulnerabilities are scored using the commonly known Common Vulnerability Scoring System (CVSS). With regards to open-source vulnerabilities, HDS may assess the vulnerability according to its relevance in terms of how HDS recommends deploying its products, software, and services. A security advisory is typically provided only for HDS-specific vulnerabilities. The following section describes the prioritization for when a vulnerability has been assessed and is eligible for correction:

CVSS v4.0 high/critical (7.0 – 10.0)

HDS aims to resolve the vulnerability no later than 4 weeks after the external disclosure. For open-source components, the lead-time is usually longer as HDS depends on external parties for information, patches, and/or verification. Resolving a vulnerability either entails patching the software or mitigating the vulnerability by disabling the affected component or functionality.

CVSS v4.0 low/medium (0.1 – 6.9)

Low/Medium vulnerabilities typically entail less significant consequences to the product’s security as they either require privileged access to the device or have limited impact on confidentiality, integrity, or availability. Therefore, HDS may resolve the vulnerability eventually as part of an upcoming scheduled release if deemed necessary. For open-source components, the lead-time is usually longer as HDS depends on external parties for information, patches, and/or verification. Resolving a vulnerability either entails patching the software or mitigating the vulnerability by disabling the affected component or functionality.

Supported software/services

The support stage of an HDS software/service is defined through a common software lifecycle process. HDS software/services are usually supported three years after the discontinuation announcement. While in this phase, HDS software/services are considered supported until they have reached their Discontinued software/services phase.

Supported products

The support of an HDS product is defined through the common hardware product lifecycle process. HDS products are considered supported until they have reached the Discontinued product. Online support only phase Information about the actual status of HDS products can be obtained from the corresponding HDS product page on www.hds.sk.

Reporting vulnerabilities

HDS works continuously to identify and limit the risk associated with vulnerabilities in our offering. However, if you identify a security vulnerability associated with an HDS product, software or service, we urge you to report the problem immediately. Timely reporting of security vulnerabilities is critical for reducing the likelihood that they can be exploited in practice. Security vulnerabilities related to open-source software components should be addressed directly to the responsible entity.

End users, partners, vendors, industry groups, and independent researchers who have identified a potential vulnerability are encouraged to submit their findings through this form. The submitted report should include:

  • Technical information about the potential vulnerability.
  • Steps to reproduce.
  • Estimated CVSS v4.0 score rating and resulting vector string.
  • A remediation suggestion.
  • The researcher’s own vulnerability disclosure policy if available.

The following response times from HDS can be expected:

  • The time to first response within 2 business days after receiving the initial submission.
  • The time to triage (from the time to first response) within 10 business days.

Disclosing vulnerabilities

Once a reported finding has been investigated and confirmed as a legitimate vulnerability, HDS assigns a CVE ID and begins the responsible disclosure process. HDS strives to collaborate with security researchers on further details, such as the CVSS v4.0 score, the content of the security advisory and/or press releases (if applicable), and agrees on the external disclosure date.

HDS follows a structured quarterly CVE disclosure cycle, occurring on the second Tuesday of February, May, August, and November. This schedule serves as the standard window for publicly disclosing validated vulnerabilities, which includes the submission of the CVE ID to MITRE and the publication of the security advisory or press release for the affected HDS products and services. Out-of-band disclosures may be made if deemed necessary. Disclosures are only made when there are CVEs to disclose.

Out-of-scope vulnerabilities

Some vulnerabilities are out-of-scope for the HDS vulnerability management policy. Please do not submit reports on out-of-scope vulnerabilities in the list below to product.security@hds.sk.

  • DLL-hijacking/DLL-sideloading vulnerabilities in HDS software applications that are running on Microsoft Windows OS. For more information, see the following article.
  • Vulnerabilities requiring high privileges and/or social engineering that are started/executed with root/administrator access and/or require complex user interactions.
  • Sub-domain takeovers such as gaining control over a host that points to a service not currently in use.
  • User misconfigurations that could be prevented by following HDS hardening guides:
  • Vulnerabilities in third party user- or partner-created content or applications, for instance ACAPs that can be uploaded and run on HDS devices.
  • Cross-site request forgery (CSRF) or cross-site scripting (XSS) vulnerabilities that trick the user into accessing a malicious website or clicking on a disguised link while accessing the web interface of HDS devices.
  • Any DoS type attack, examples of these are:
    • Resource exhaustion of a device through normal API usage with modified parameter inputs.
    • Resource exhaustion due to high frequency API calls.
    • Resource exhaustion using slowloris attacks.
  • Third party open-source vulnerabilities that are registered with a CVE ID located in software components or packages used in HDS products, software or services. Common examples of such software components are the Linux Kernel, OpenSSL, Apache, and others.
  • Missing HTTP(S) security headers such as X-Frame-Options.
  • Vulnerability reports generated by third party network security scanners.
  • Unsupported products/software/services that have reached the “Discontinued product. Online support only” phase.
  • Reported issues that do not clearly document a real, exploitable issue with security impact. For instance, mismatching application-level errors and HTTP response codes when performing API fuzzing.

Security notification service

HDS publishes guidelines, security advisories and statements on HDS Vulnerability Management Policy. Furthermore, information can be obtained by subscribing to HDS security notification service on HDS security notification service.

Report a vulnerability

If you have discovered a new vulnerability in one of our products or services, we encourage you to report the finding to us.



In case of multiple attachments, please send a compressed file in .ZIP or .RAR format.