000036710 - How do I report a security vulnerability identified in an RSA product?

Document created by RSA Customer Support Employee on Sep 7, 2018Last modified by RSA Customer Support Employee on Sep 1, 2020
Version 4Show Document
  • View in full screen mode

Article Content

Article Number000036710
Applies ToThis article applies to all RSA customers and partners and to all RSA products and solutions.
IssueWhat is the correct procedure for reporting a security vulnerability that has been identified in an RSA product?
ResolutionReference RSA Vulnerability Response Policy.

RSA strives to help our customers minimize risk associated with security vulnerabilities in our products. Our goal is to provide customers with timely information, guidance and mitigation options to address vulnerabilities. The RSA Product Security Incident Response Team (RSA PSIRT) is chartered and responsible for coordinating the response and disclosure for all product vulnerabilities that are reported to RSA.

RSA employs a rigorous process to continually evaluate and improve our vulnerability response practices and we regularly benchmark these against the rest of the industry.
 

How to Report a Security Vulnerability


If you identify a security vulnerability in any RSA product, please report it immediately. Timely identification of security vulnerabilities is critical to mitigating potential risks to our customers.

RSA customers and partners should contact the appropriate technical support team to report security issues discovered in an RSA product. The Technical Support team, the appropriate product team and RSA PSIRT will work together to address the issue and provide customers with next steps.

Security researchers, industry groups, vendors, and other users that do not have access to Technical Support should send vulnerability reports to RSA PSIRT via email (responsibledisclosure@rsa.com).

When reporting a potential vulnerability please include as much of the below information as possible to help us better understand the nature and scope of the reported issue: 
  • Product name and version that contains the vulnerability
  • Environment or system information under which the issue was reproduced (e.g. product model number, OS version etc.)
  • Type and/or class of vulnerability (XSS, buffer overflow, RCE, etc.)
  • Step-by-step instructions to reproduce the vulnerability
  • Proof-of-concept or exploit code
  • Potential impact of the vulnerability
NotesFor more information, refer to the RSA Vulnerability Response Policy page on the rsa.com website.

Attachments

    Outcomes