Keenetic Coordinated Vulnerability Disclosure Policy
Issuer and the Scope: The issuing entity of this Policy is Keenetic GmbH, Berliner Straße 300b, 63067 Offenbach am Main, Germany. This Policy is established as the standard governing Policy for all Keenetic entities worldwide.
As a security researcher or vulnerability reporter, your work is vital to strengthening the safety of digital products and infrastructures. We created this Coordinated Vulnerability Disclosure (“CVD”) policy to ensure that your findings are treated with respect, handled responsibly, and acted upon quickly. It sets out how Keenetic (referred to as “Keenetic GmbH”, “we”, “us”) will respond to your reports, the assurances you can expect, and the steps that lead to a successful disclosure process.
Furthermore, we want to make sure your contributions are valued. We encourage you to participate in the Keenetic bug bounty program, that offers financial rewards to express our appreciation and encourage continued collaboration.
By participating in this process, you are not only helping to protect users and organizations but also joining a community where your expertise is recognized and rewarded. Together, we can make Keenetic products safer, build trust, and create a stronger digital ecosystem.
Ⅰ. Scope of the CVD policy – What do we consider to be a valid vulnerability
A valid vulnerability, in the context of this policy, is understood as a weakness, flaw, or security issue that directly affects one of the Keenetic’s products or infrastructure that can be exploited.
To qualify as a valid report, the information disclosed should not already be publicly known, thereby ensuring that the report contributes new and actionable knowledge to the security process. Furthermore, reports that are solely generated by automated tools or scans without sufficient supporting documentation are not considered adequate, as they lack the necessary evidence to enable meaningful analysis and remediation of a valid vulnerability. Each report should ideally contain supporting details. This helps us focus on real issues and respond faster.
Ⅱ. How to report a vulnerability
When you discover a valid vulnerability, file a report by using the following channels.
Email: You can email us at security@keenetic.com to ensure proper coordination and tracking.
Web Form: We provide a secure web submission form on our vulnerability disclosure page: https://keenetic.com/security/anonymous-reporting-form. This form supports anonymous reporting. You are not required to provide any personal information to submit a report; however, keep in mind that if you report anonymously we will not be able to ask you follow-up questions, which may limit our ability to investigate the issue. The web form is available in English, and it guides you to include the key details we need.
Security.txt: We maintain a keenetic.com/security.txt on our website which lists our vulnerability disclosure contacts and preferences. Reporters can refer to this file for up-to-date information on how to reach us.
When submitting a report, please include as much technical detail as possible. This helps us triage and fix the issue faster. We suggest providing:
• A description of the vulnerability and its potential impact. What could an attacker achieve? Which confidentiality/integrity/availability aspects are at risk? What could be the affected system in Keenetic’s IT infrastructure (e.g. Keenetic Corporate Systems, Operating System, App, Remote Monitoring and Management, Cloud and Keenetic Account)?
• Specific product names, versions, and configurations affected. (For websites or services, include URLs or IPs; for hardware or software, include model or version numbers.)
• Steps to reproduce the issue – e.g. what commands, inputs, or actions trigger the vulnerability. Screenshots or proof-of-concept (PoC) code are very helpful.
• If known, any suggested remediation or references to fixes (optional but appreciated).
• Your contact information (name or alias, and a secure method to reach you) if you desire a response. You may report anonymously, but then we cannot communicate with you for clarification or to give status updates.
Voluntary Information: The reporter may voluntarily provide contact information for coordination but is not required to submit personally identifiable information. You may use our web site based anonymous reporting form.
Ⅲ. What we expect from you – Code of Conduct
We only reward reporters and acknowledge their achievements under this CVE policy which adhere to high standards of integrity and responsible behavior when discovering and reporting vulnerabilities. Therefore, we do not tolerate the following behavior:
• Good Faith Testing: Reporters shall only conduct testing that is non-disruptive and necessary to confirm the vulnerability's existence (Proof of Concept). They must not intentionally compromise user data, disrupt services, or damage systems.
• No Exploitation Beyond Testing: Active exploitation of a vulnerability beyond initial proof-of-concept testing is strictly prohibited. In particular, do not abuse the vulnerability to compromise data, alter configurations, pivot to other systems, or persistently access our systems. Triggering the issue to prove its existence is sufficient – do not, for example, download more data than necessary to demonstrate the flaw. If you encounter sensitive information (e.g. personal data of users, proprietary material), cease testing and report it immediately to us, and do not disclose or retain that information.
• No social engineering or physical attacks: Do not use social engineering techniques (phishing emails, phone pretexting, etc.) against our employees or systems, and do not perform any physical security tests (such as attempting to enter our offices or data centers). This policy is limited to technical vulnerabilities in our products and infrastructure, and excludes social and physical attack vectors.
• No denial-of-service or “brute force attacks”: Refrain from performing DoS/DDoS attacks or any testing that could degrade our services’ availability for users as well as “brute force” attacks. We want to avoid any disruption to our customers.
• No third-party or public attacks: Do not target vulnerabilities in third-party services or products that we use (instead, please notify those vendors directly). Similarly, do not test systems that are not owned or operated by us. If you inadvertently access data or systems of other parties during your research, notify us and cease further action. Do not compromise or manipulate data of any third party during your research.
• Confidentiality and use of information: Reporters shall keep vulnerability details confidential and shall not publicly disclose, sell, or otherwise distribute exploit code or technical details that would enable exploitation until Keenetic has provided a public advisory or otherwise authorized disclosure. This does not restrict the reporter from notifying competent authorities, national CSIRT, or law enforcement where required by law or where immediate disclosure is necessary to prevent imminent harm.
• Remediation Period: Keenetic shall be afforded a reasonable, remediation period based on severity to investigate, remediate, and distribute security updates. If Keenetic fails to remediate or provide a credible mitigation within a reasonable period, the reporter may notify a national CSIRT or competent authority.
If a reporter inadvertently violates part of this code of conduct, we commit to still handle any discovered vulnerability in good faith to the best of our ability; however, such a reporter might not receive any rewards.
Ⅳ. Our commitment to you when a vulnerability is reported
All incoming reports are treated to the best extent possible. Therefore, at least one valid contact option should be provided by you when reporting a vulnerability. Of course, you may report a vulnerability anonymously.
1. Response
After you submit a vulnerability report to us, we will let you know we received your report. This will be a personal reply from our security team. If we need clarification or additional information, we’ll ask as soon as possible. Be aware, for anonymous submissions, we obviously cannot respond, but we will proceed to investigate. For the transmission of confidential information, we need you to provide at least your email to be able to use our PGP-encryption key available at https://keenetic.com/security.txt
After further analysis of the report, we provide you with feedback as to whether we confirm or reject the reported vulnerability, meaningful queries to understand the reported vulnerability or an explanation why the investigation of the reported vulnerability is taking longer as expected.
2. Confidential communication
We ensure to the extent permitted by law that each incoming vulnerability report is treated confidential and your personal data will not be disclosed to third parties without your explicit consent.
Information required for the public disclosure of the validated and verified vulnerability is publicly disclosed to the extent we are obliged by law.
3. Anonymous reporting (optional)
You may use our web site based anonymous reporting form.
As we respect your wish to remain anonymous, please be aware that anonymous reports can only be processed to a limited extent or possibly not at all, due to the missing option to request technical or content-related queries, especially in the case of complex issues.
4. Respectful and open communication
All communication will remain professional and we will treat you with respect. We expect the same courtesy in return – we have zero tolerance for any discrimination, harassment or disrespect in communications from either side.
Our security team may reach out with questions to better understand the issue or request reproducible technical artifacts and instructions so the vulnerability can be reproduced and fixed. We encourage you to ask for updates at any time; we consider follow-up inquiries welcome and a sign of your interest, not an annoyance.
Ⅴ. Coordinating and completing the disclosure
Validated and verified vulnerabilities are publicly disclosed by Keenetic. The public notification includes:
-
A description of the vulnerability.
-
Information allowing users to identify affected products/versions.
-
The impact and severity.
-
Clear instructions on how to apply corrective measures or a patch.
The coordinated vulnerability disclosure process is considered to be complete, if the vulnerability has been mitigated or fixed by appropriate measures and has been publicly disclosed indications of the vulnerability report are unfounded and, therefore, the report can only be processed to a limited extend or not at all.
We consider a CVD process completed when one of the following occurs:
-
a fix or mitigation has been deployed and a public advisory released; or
-
the reported issue was determined not to be a vulnerability (false positive or out of scope) and this was communicated to the reporter; or
-
we are unable to reproduce or need more info and the reporter is unresponsive for an extended period (generally 30 days), in which case we close the case pending new information.
We communicate the end of the CVD process to the reporter, unless the vulnerability was reported anonymously.
Ⅵ. Rewards
We deeply appreciate the efforts of reporters and others who privately report vulnerabilities to us. As a token of thanks, we operate a Bug Bounty Program. External security researchers who responsibly report vulnerabilities in accordance with this policy may be eligible for a financial reward as a token of appreciation. The amount of any reward is determined individually based on the severity of the reported vulnerability as described in our Bug Bounty Terms & Conditions.
Ⅶ. Legal Safe Harbor
By adhering to this CVD policy, Keenetic acknowledges that the reporter is acting in "good faith" research, and will not pursue criminal charges against the reporter in relation to the research activities.