Security Bounty Program
QNAP has an uncompromising commitment to information security and has partnered with the security research community to identify and fix vulnerabilities to keep our users, products, and the internet safer. To thank those contributing, QNAP provides rewards through our security bounty program.
Program Scope
Our security bounty program only accepts security vulnerabilities in QNAP products and services. Out-of-scope vulnerabilities will not be eligible for a reward, with exceptions made for out-of-scope reports of critical vulnerabilities depending on the situation.
How to report the vulnerability and get rewards?
Use the below PGP encryption public key to encrypt your email and send it to security@qnap.com. We will contact you as soon as possible.
Vulnerability Report Suggested Format
-
Operation Systems
-
Applications
-
Cloud Services
PGP encryption key
Reward Qualifications
-
You must be the first researcher to report the vulnerabilities.
-
You must not have publicly shared any files and/or details related to the vulnerability. This includes uploads to any publicly-accessible websites.
-
The reported vulnerability is confirmed to be verifiable, replicable, and a valid security issue by the QNAP PSIRT team.
-
You agree all the terms and conditions of the security bounty program.
The reward may be increased based on:
-
Format Integrity: Comply with the format examples and provide detailed information when reporting vulnerabilities in operation systems, applications, or cloud services. Format examples: Operation Systems, Applications, Cloud Services.
-
Steps to Reproduce: Illustrate your steps to reproduce the vulnerabilities.
-
Problem Descriptions: Clearly and concisely present your troubleshooting and approach.
-
Other Supporting Information: Include testing code, scripts, and anything else required for your explanation.
-
Raw Data of Attacks (exploit payload): A report in text form is required for ensuring data integrity. Vulnerability assessments can fall short of QNAP PSIRT's expectations when network payloads were provided in images only.
FAQ
The reward is determined by the complexity of successfully exploiting the vulnerability, the potential exposure, and the percentage of impacted users and systems.
If videos can make it easier for us to understand how vulnerability are exploited, the QNAP award committee may increase the reward as a result. Please note that written documentation must still be provided (e.g., product information, vulnerability summary and steps to reproduce ) as it helps in managing the vulnerability disclosure process.
A vulnerability report must include at least the following information: the product name, version, and build number where the vulnerability exists, or the URL location for cloud services.
It should also provide a summary of the potential threats posed by the vulnerability, along with clearly detailed replication steps. Additionally, the report can be accompanied by a video demonstrating the vulnerability.
Please use the PGP Key provided by QNAP to encrypt the report and send it to security@qnap.com. The system will automatically respond with a technical support number, which you can use to inquire about the review progress. The QNAP PSIRT team will proactively contact the researcher to verify the completeness of the submitted information. If all the required information has been provided, the researcher will receive a QNAP PSIRT vulnerability confirmation letter within one week. The letter will include the assigned CVE ID for the reported security issue. The award proposal will be notified via email four weeks after the date of the vulnerability confirmation letter. If the researcher agrees, QNAP is expected to make the payment 12 weeks after receiving the confirmation response.
Subscribe QNAP eNews to receive the latest product security news
Operating Systems
Rewards up to US$20,000
Reward |
Confirmed and rated security vulnerability reports can receive rewards up to $20,000 |
---|---|
Products within scope |
Only reports about officially released and the latest versions of products, applications and services are accepted.
|
Restrictions |
The security bounty program is strictly limited to vulnerabilities found in QNAP products and services. Actions that may potentially damage or detrimentally affect QNAP servers or data are prohibited. Any vulnerability testing must not violate local or Taiwanese laws. Vulnerability reports are not accepted if they describe or involve:
|
Applications
Rewards up to US$10,000
Reward |
Confirmed and rated security vulnerability reports can receive rewards up to $10,000 |
---|---|
Products within scope |
Only reports about officially released and the latest versions of products, applications and services are accepted. The program only accepts reports of security vulnerabilities in the following applications:
|
Restrictions |
The security bounty program is strictly limited to vulnerabilities found in QNAP products and services. Actions that may potentially damage or detrimentally affect QNAP servers or data are prohibited. Any vulnerability testing must not violate local or Taiwanese laws. Vulnerability reports are not accepted if they describe or involve:
|
Cloud Services
Rewards up to US$5,000
Reward |
Confirmed and rated security vulnerability reports can receive rewards up to $5,000 |
---|---|
Products within scope |
Only reports about officially released and the latest versions of products, applications and services are accepted. The program only accepts reports of security vulnerabilities in the following domains :
|
Restrictions |
The security bounty program is strictly limited to vulnerabilities found in QNAP products and services. Actions that may potentially damage or detrimentally affect QNAP servers or data are prohibited. Any vulnerability testing must not violate local or Taiwanese laws. Vulnerability reports are not accepted if they describe or involve:
|
Operating Systems
(fields marked * are required)
-
Product*: The product name, for example, QuTS hero
-
Version*: The version and build number, for example, h5.0.1.2376 build 20230421
-
Summary*: In format of “A type of vulnerability in location”, for example, Command Injection in abc.cgi
-
Access Permissions*: The access permissions when you exploited the vulnerabilities. For example: None / Regular User / Administrator Group / Admin.
-
Motivation: Why do you start the vulnerabilities research?
-
Tools: The tools you used during the vulnerabilities research.
-
Description: Information related to the vulnerability
-
for example:
-
A short description of the possible damage
-
Analysis of the vulnerability
-
How the vulnerability can be identified
-
The tools leveraged
-
-
CWE ID(s): CWE-XXX, CWE-YYY and so on
-
CAPEC ID(s): CAPEC-XXX, CAPEC-YYY and so on
-
CVSS Score: CVSS:3.X/AV:X/AC:X/PR:X/UI:X/S:X/C:X/I:X/A:X (X.X), CVSS v3.1., Please refer to Base Score Calculator https://cvss.js.org/
-
Steps to Reproduce*: Step-by-step instructions to reproduce
-
Proof of Concept: Any videos, screenshots, or exploits
Applications
(fields marked * are required)
-
Application*: The application name, for example, File Station
-
Version*: The version and build number, for example, 2.0.2 ( 2022/01/26 )
-
Summary*: In format of “A type of vulnerability in location”, for example, Buffer overflow in abc app
-
Access Permissions*: The access permissions when you exploited the vulnerabilities. For example: None / Regular User / Administrator Group / Admin.
-
Motivation: Why do you start the vulnerabilities research?
-
Tools: The tools you used during the vulnerabilities research.
-
Description: Information related to the vulnerability
-
for example:
-
A short description of the possible damage
-
Analysis of the vulnerability
-
How the vulnerability can be identified
-
The tools leveraged
-
-
CWE ID(s): CWE-XXX, CWE-YYY and so on
-
CAPEC ID(s): CAPEC-XXX, CAPEC-YYY and so on
-
CVSS Score: CVSS:3.X/AV:X/AC:X/PR:X/UI:X/S:X/C:X/I:X/A:X (X.X), CVSS v3.1., Please refer to Base Score Calculator https://cvss.js.org/
-
Steps to Reproduce*: Step-by-step instructions to reproduce
-
Proof of Concept: Any videos, screenshots, or exploits
Cloud Services
(fields marked * are required)
-
Domain*: The domain name (for example, https://account.qnap.com)
-
Summary*: In format of “A type of vulnerability in location”, for example, XSS on https://account.qnap.com
-
Motivation: Why do you start the vulnerabilities research?
-
Tools: The tools you used during the vulnerabilities research.
-
Description: Information related to the vulnerability
-
for example:
-
A short description of the possible damage
-
Analysis of the vulnerability
-
How the vulnerability can be identified
-
The tools leveraged
-
-
CWE ID(s): CWE-XXX, CWE-YYY and so on
-
CAPEC ID(s): CAPEC-XXX, CAPEC-YYY and so on
-
CVSS Score: CVSS:3.X/AV:X/AC:X/PR:X/UI:X/S:X/C:X/I:X/A:X (X.X), CVSS v3.1., Please refer to Base Score Calculator https://cvss.js.org/
-
Steps to Reproduce*: Step-by-step instructions to reproduce
-
Proof of Concept: Any videos, screenshots, or exploits