Security Experts:

Microsoft Adds Teams Mobile Applications to Bug Bounty Program

Microsoft on Monday announced that it has included the Teams mobile applications for Android and iOS within the scope of its bug bounty programs.

The company added the desktop client of the Teams business communication platform to the Applications Bounty Program back in March, and is now expanding the program to include the mobile clients as well.

By expanding the bug bounty program, the tech giant is hoping to find any high-impact security vulnerabilities in the mobile applications. Security researchers who identify and report such bugs may be eligible for monetary rewards of up to $30,000 per report.

The highest payouts available through the program are two scenario-based awards ranging between $15,000 and $30,000, which may be obtained for vulnerabilities of high potential impact on customer privacy and security, such as remote code execution flaws.

Other vulnerability reports for the Teams iOS and Android mobile applications, Microsoft says, are eligible for bounty rewards ranging from $500 to $15,000.

The company will continue to award bug bounties for vulnerability reports submitted for both the Teams desktop client and the Teams online services, as part of their respective bounty programs.

Furthermore, Microsoft says that researchers who submit valid reports for vulnerabilities in the Teams mobile clients are eligible for bonus points under the Researcher Recognition Program (for the annual MSRC Most Valuable Security Researcher list).

Further information on the Microsoft Applications Bounty Program can be found on the company’s online portal. There, interested researchers can find specific details on report eligibility, the monetary rewards they can receive for different types of security holes, and what assets are within and out of scope of the bug bounty program.

Related: Microsoft Paid Out $13.6 Million in Bug Bounties in Past Year

Related: Microsoft Pays $50,000 Bounty for Account Takeover Vulnerability

Related: Microsoft Explains How It Processes Vulnerability Reports

view counter