Security Bounty Program

QNAP has an uncompromising commitment to information security and has partnered with the security research community to identify and fix vulnerabilities to keep our users, products, and the internet safer. To thank those contributing, QNAP provides rewards through our security bounty program.

Program Scope

Our security bounty program only accepts security vulnerabilities in QNAP products and services. Out-of-scope vulnerabilities will not be eligible for a reward, with exceptions made for out-of-scope reports of critical vulnerabilities depending on the situation.

  • Operating Systems

    Includes QTS, QuTS hero, QuTScloud

  • Applications

    Includes QNAP-developed applications

  • Cloud Services

    Includes cloud services provided by QNAP

How to report the vulnerability and get rewards?

Use the below PGP encryption public key to encrypt your email and send it to security@qnap.com. We will contact you as soon as possible.

Vulnerability Report Suggested Format

PGP encryption key

Reward Qualifications

  • You must be the first researcher to report the vulnerabilities.

  • You must not have publicly shared any files and/or details related to the vulnerability. This includes uploads to any publicly-accessible websites.

  • The reported vulnerability is confirmed to be verifiable, replicable, and a valid security issue by the QNAP PSIRT team.

  • You agree all the terms and conditions of the security bounty program.

The reward may be increased based on:

  • Format Integrity: Comply with the format examples and provide detailed information when reporting vulnerabilities in operation systems, applications, or cloud services. Format examples: Operation Systems, Applications, Cloud Services.

  • Steps to Reproduce: Illustrate your steps to reproduce the vulnerabilities.

  • Problem Descriptions: Clearly and concisely present your troubleshooting and approach.

  • Other Supporting Information: Include testing code, scripts, and anything else required for your explanation.

  • Raw Data of Attacks (exploit payload): A report in text form is required for ensuring data integrity. Vulnerability assessments can fall short of QNAP PSIRT's expectations when network payloads were provided in images only.

FAQ

The reward is determined by the complexity of successfully exploiting the vulnerability, the potential exposure, and the percentage of impacted users and systems.

If videos can make it easier for us to understand how vulnerability are exploited, the QNAP award committee may increase the reward as a result. Please note that written documentation must still be provided (e.g., product information, vulnerability summary and steps to reproduce ) as it helps in managing the vulnerability disclosure process.

A vulnerability report must include at least the following information: the product name, version, and build number where the vulnerability exists, or the URL location for cloud services.
It should also provide a summary of the potential threats posed by the vulnerability, along with clearly detailed replication steps. Additionally, the report can be accompanied by a video demonstrating the vulnerability.

Please use the PGP Key provided by QNAP to encrypt the report and send it to security@qnap.com. The system will automatically respond with a technical support number, which you can use to inquire about the review progress. The QNAP PSIRT team will proactively contact the researcher to verify the completeness of the submitted information. If all the required information has been provided, the researcher will receive a QNAP PSIRT vulnerability confirmation letter within one week. The letter will include the assigned CVE ID for the reported security issue. The award proposal will be notified via email four weeks after the date of the vulnerability confirmation letter. If the researcher agrees, QNAP is expected to make the payment 12 weeks after receiving the confirmation response.

Subscribe QNAP eNews to receive the latest product security news

Choose specification

      Show more Less

      Choose Your Country or Region

      back to top