Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

FireEye Launches Public Bug Bounty Program on Bugcrowd

FireEye this week announced that its Bugcrowd-powered bug bounty program has become public, for all registered researchers to participate.

FireEye this week announced that its Bugcrowd-powered bug bounty program has become public, for all registered researchers to participate.

The program, which has been running privately on the crowd-sourced bug hunting platform for a while, welcomes all Bugcrowd researchers interested in identifying vulnerabilities in a broad range of FireEye websites, including those of subsidiaries and localized domains.

Researchers can earn between $1,500 and $2,500 for valid vulnerabilities that are considered critical, between $800 and $1,250 for severe vulnerabilities, between $200 and $500 for moderate severity issues, and from $50 to $150 for low risk bugs.

Interested researchers, however, are asked to ensure they only target resources within the scope of the program in order to qualify for monetary rewards, and to refrain from testing the ‘contact us’ and ‘support’ forms for vulnerabilities.

“Testing is only authorized on the targets listed as In-Scope. Any domain/property of FireEye not listed in the targets section is out of scope,” the security solutions provider notes.

The company also points out that social engineering, denial or service and physical security attacks are not within the scope of the bug bounty program. Attacks that require physical or administrative access to hosting systems are not in scope either.

“While engaging with us, we ask that reporters honor responsible disclosure principles and processes and give FireEye an opportunity to evaluate, respond, and if necessary, remediate any confirmed security vulnerabilities prior to public disclosure,” the company also notes.

Advertisement. Scroll to continue reading.

Reports will be prioritized and rated in line with the Bugcrowd Vulnerability Rating Taxonomy, but FireEye underlines that the priority of some vulnerabilities could be modified based on likelihood or impact. Any such change will be accompanied by a detailed explanation and the researcher will be provided with the opportunity to appeal.

In the coming months, FireEye will expand the bug bounty program to add more products and services.

Researchers can learn additional information on the in-scope resources and on the rules governing FireEye’s bug bounty program on Bugcrowd’s website.

Related: ExpressVPN Announces Bug Bounty Program on Bugcrowd

Related: Sony Launches PlayStation Bug Bounty Program on HackerOne

Related: DARPA Bug Bounty Program Seeks to Harden SSITH Hardware Protections

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.