Built on trust, transparency, and collaboration
Think you might have discovered a security vulnerability in one of our products? Then you’ve come to the right place. Our dedicated team is ready to work with you to resolve it as quickly as possible.
Scope of the program
Vulnerabilities affecting the products that are maintained as per our product lifecycle will be investigated and worked on by our team. In addition to the products, the following domains are also presently in this scope:
- *.clearance.network
- *.clearid.io
- *.genetec.cloud
- *.genetec.com
- login.genetec.com
- *.genetec.one
- *.geneteccloud.com
- *.q2c.eu
- *.stratocast.com
- *.autovu.com
- *.curbsense.com
- *.autovu.cloud
Which vulnerabilities can you report?
Qualifying vulnerabilities
- Authentication flaws
- Circumvention of our platform/privacy permission models
- Elevation of privileges
- Cross-site scripting (XSS)
- Cross-site request forgery (CSRF/XSRF)
- Remote code execution
- SQL Injection
- Local file inclusion
- Insecure direct object reference
- Server-side request forgery
Out-of-scope vulnerabilities
- Vulnerabilities that rely on social engineering (this includes phishing attacks against Genetec employees)
- Denial of Service Attacks (DOS)
- Physical attempts against Genetec property or data centers
- Attack that assumes admin control of a service machine
- Missing best practices with no demonstrable security impact (i.e. missing HTTP headers, SSL/TLS configuration, etc.)
- Insecure cookies for non-sensitive cookies or 3rd party cookies
- Sending blind XSS by email or spamming Genetec employees
- Vulnerable third party packages without proof of concept (ex. jQuery)
- Missing DNS CAA record