RSS Subscription * To review security updates from before 2025, please visit: Here
Vulnerability Disclosure Policy
Responsible reporting guidelines:
ASUS appreciates all contributions from customers and the wider ASUS community that help to improve the security of our products and services. However, we kindly request that you act responsibly and bear in mind the following when investigating or reporting any issues:
Do not attempt to access or modify any ASUS services, systems, products or software without authorization.
Do not disclose, or modify, destroy or misuse any data you may discover.
All information given to or received from any party relating to the reported issues must remain completely confidential.
Please do not engage in DoS attacks or any destructive testing that may affect the confidentiality, integrity or availability of information and systems.
Refrain from participating in social engineering or phishing activities targeting customers or employees.
Requests for compensation regarding the time and resources spent verifying vulnerabilities, or for discovered vulnerabilities, will not be considered.
Excluded Submission Types
We always prioritize security and encourage researchers to submit all potential security issues. Each report will be carefully reviewed. However, the following vulnerabilities (including but not limited to) have a very low impact on the system or user security. ASUS will handle and respond to submissions at its discretion based on the circumstances.
Outdated software versions that contain known vulnerabilities in libraries (e.g., jQuery), leading to low-impact security risks
Inadequate rate limiting or the absence of CAPTCHA verification mechanisms
Missing or incomplete SPF, DMARC, or DKIM records
Cookies not properly configured with HTTPOnly or Secure flags
Vulnerabilities that only affect outdated or unpatched browsers, extensions, and other non-ASUS software
Automated tool reports based solely on tool-generated findings, without further analysis of the vulnerabilities
Exposure of publicly accessible files or directories (e.g., robots.txt)
Low-risk issues related to clickjacking or UI elements (e.g., problems that are only exploitable through clickjacking)
Displaying stack traces on error pages instead of generic error messages
Disclosure of technology or component information (e.g., PHP,ASP.NET usage)
Account or email enumeration with no significant impact on the security of ASUS services or products
Absence of non-mandatory security headers, where the lack does not lead to an exploitable vulnerability
Insufficient HTTP security settings, where the specific impact (such as data leakage or functionality abuse) cannot be demonstrated
Low-risk CSRF issues (e.g., login, logout, or minor unauthenticated cross-site request forgery vulnerabilities)
How to report a security vulnerability or issue to ASUS
We welcome all reports related to security incidents concerning ASUS. We invite you to contact us about such matters through our dedicated web form: http://www.stzgcm.com/securityadvisory. By submitting a vulnerability report, you acknowledge and accept ASUS's vulnerability submission policy.
To help us address your concerns quickly, please ensure you provide the following information on the website.
Your full name and a means of contacting you. This can be an email address or any other preferred method we can use to get in touch with you.
Full and detailed information about the issue you wish to report. This should include the following information, as applicable:
The name of the ASUS service(s) or system(s) that your concern relates to.
The name, description and version number of any affected ASUS software products.
A full and detailed description of the problem or issue, along with any background information that you believe is relevant, and any other pertinent information that may help us reproduce and/or resolve the issue. Finding Vulnerabilities (Problems) Step-by-Step Instructions for Reproducing the Vulnerability Technical Description of the Vulnerability (Including Proof of Concept, if possible) Potential Impact of the Vulnerability Any Other Information That Can Help Us Reproduce and Resolve the Issue
Methods for discovering vulnerabilities or issues
Detailed steps for reproducing the vulnerability
Technical description of the vulnerability (if possible, including proof of concept)
Potential impact of the vulnerability
Any additional information that could help us reproduce and resolve the issue
We encourage you to use encrypted communication to protect the confidentiality of your information. You can encrypt your report using the PGP public key provided below:
Once we have resolved the reported issue(s), we will provide a suitable solution to all affected customers. We will treat this with the utmost priority and make the solution available as soon as it practical to do so.
ASUS will also maintain a list of the latest software updates, along with descriptions of the issues that have been fixed. Although we will notify customers wherever possible, we also recommend that customers visit this page regularly to make sure they are aware of the latest updates.
Hall of Fame
◀
▶
August
Gu Yongzeng (@0x0dee)
July
Gandalf4a of PKU-Changsha Institute for Computing Digital Economy
Ming Yuan of Zhongguancun Laboratory
Jack from Numen cyber Labs, Singapore
MrBruh
June
Jack from Numen cyber Labs, Singapore
Febin Mon Saji
Taha Yıldırım
May
Leon Jacobs from Orange Cyberdefense’s SensePost team
Shaber Tseng
Nanyu Zhong of VARAS@IIE
Yassine Damiri
Chanhee Park (@ch4rli3kop), Dongjoo Kim (@d05004), Myounghun Song (@songmh0614), Seonghun Park (@qkrtjdgns147) from Computer Systems Security Lab, School of Cybersecurity, Korea University
Krishna Yadav (@xrishnayadav)
April
Quinn Nguyen from PawnCS
MrBruh
Marcin 'Icewall' Noga
March
Thomas 'TKYN' Keefer
February
Marcin 'Icewall' Noga
leeya_bug
Mounir Elgharabawy
Disclaimer
All aspects of the ASUS PSIRT (Product Security Incident Response Team) processes and policies may be adjusted based on specific circumstances and are subject to change without prior notice. We do not guarantee a response to any particular issue or category of issues. The use of the information in this document or any related links is at your own risk.
Contact Us
If you have any questions, concerns, feedback, or complaints regarding our Privacy Policy, or if you believe that ASUS has not complied with it, please do not hesitate contact us through 📧 privacy@stzgcm.com.