This article outlines the correct procedure for reporting a security vulnerability that has been identified in a SecurID product.
Reference SecurID Vulnerability Response Policy
SecurID strives to help our customers minimize risk associated with security vulnerabilities in our products. Our goal is to provide customers with timely information, guidance and mitigation options to address vulnerabilities. The RSA Product Security Incident Response Team (RSA PSIRT) is chartered and responsible for coordinating the response and disclosure for all product vulnerabilities that are reported to RSA.
SecurID employs a rigorous process to continually evaluate and improve our vulnerability response practices and we regularly benchmark these against the rest of the industry.
How to Report a Security Vulnerability
If you identify a security vulnerability in any SecurID product, please report it immediately. Timely identification of security vulnerabilities is critical to mitigating potential risks to our customers.
SecurID customers and partners should contact the appropriate technical support team to report security issues discovered in an SecurID product. The Technical Support team, the appropriate product team and RSA PSIRT will work together to address the issue and provide customers with next steps.
Security researchers, industry groups, vendors, and other users that do not have access to Technical Support should send vulnerability reports to RSA PSIRT via email (firstname.lastname@example.org).
When reporting a potential vulnerability please include as much of the below information as possible to help us better understand the nature and scope of the reported issue:
- Product name and version that contains the vulnerability
- Environment or system information under which the issue was reproduced (e.g. product model number, OS version etc.)
- Type and/or class of vulnerability (XSS, buffer overflow, RCE, etc.)
- Step-by-step instructions to reproduce the vulnerability
- Proof-of-concept or exploit code
- Potential impact of the vulnerability
For more information, refer to the RSA Vulnerability Response Policy
page on the rsa.com website.