PG

RSS Subscription * To review security updates from before 2025, please visit: Here

Vulnerability Disclosure Policy

Responsible reporting guidelines:

ASUS appreciates all contributions from customers and the wider ASUS community that help to improve the security of our products and services. However, we kindly request that you act responsibly and bear in mind the following when investigating or reporting any issues:

  1. Do not attempt to access or modify any ASUS services, systems, products or software without authorization.
  2. Do not disclose, or modify, destroy or misuse any data you may discover.
  3. All information given to or received from any party relating to the reported issues must remain completely confidential.
  4. Please do not engage in DoS attacks or any destructive testing that may affect the confidentiality, integrity or availability of information and systems.
  5. Refrain from participating in social engineering or phishing activities targeting customers or employees.
  6. Requests for compensation regarding the time and resources spent verifying vulnerabilities, or for discovered vulnerabilities, will not be considered.

Excluded Submission Types

We always prioritize security and encourage researchers to submit all potential security issues. Each report will be carefully reviewed. However, the following vulnerabilities (including but not limited to) have a very low impact on the system or user security. ASUS will handle and respond to submissions at its discretion based on the circumstances.

How to report a security vulnerability or issue to ASUS

We welcome all reports related to security incidents concerning ASUS. We invite you to contact us about such matters through our dedicated web form: http://www.stzgcm.com/securityadvisory. By submitting a vulnerability report, you acknowledge and accept ASUS's vulnerability submission policy.

To help us address your concerns quickly, please ensure you provide the following information on the website.

  1. Your full name and a means of contacting you. This can be an email address or any other preferred method we can use to get in touch with you.
  2. Full and detailed information about the issue you wish to report. This should include the following information, as applicable:
    • The name of the ASUS service(s) or system(s) that your concern relates to.
    • The name, description and version number of any affected ASUS software products.
    • A full and detailed description of the problem or issue, along with any background information that you believe is relevant, and any other pertinent information that may help us reproduce and/or resolve the issue. Finding Vulnerabilities (Problems) Step-by-Step Instructions for Reproducing the Vulnerability Technical Description of the Vulnerability (Including Proof of Concept, if possible) Potential Impact of the Vulnerability Any Other Information That Can Help Us Reproduce and Resolve the Issue
    • Methods for discovering vulnerabilities or issues
    • Detailed steps for reproducing the vulnerability
    • Technical description of the vulnerability (if possible, including proof of concept)
    • Potential impact of the vulnerability
    • Any additional information that could help us reproduce and resolve the issue

We encourage you to use encrypted communication to protect the confidentiality of your information. You can encrypt your report using the PGP public key provided below:

PGP Public Key

Valid until: 2025/11/6
Fingerprint: B336802655EF3AD23767440C86474747C219DE2D
-----BEGIN PGP PUBLIC KEY BLOCK-----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=apel
-----END PGP PUBLIC KEY BLOCK-----

What happens next?

Once we have resolved the reported issue(s), we will provide a suitable solution to all affected customers. We will treat this with the utmost priority and make the solution available as soon as it practical to do so.

ASUS will also maintain a list of the latest software updates, along with descriptions of the issues that have been fixed. Although we will notify customers wherever possible, we also recommend that customers visit this page regularly to make sure they are aware of the latest updates.

Hall of Fame

August

  • Gu Yongzeng (@0x0dee)

July

  • Gandalf4a of PKU-Changsha Institute for Computing Digital Economy
  • Ming Yuan of Zhongguancun Laboratory
  • Jack from Numen cyber Labs, Singapore
  • MrBruh

June

  • Jack from Numen cyber Labs, Singapore
  • Febin Mon Saji
  • Taha Yıldırım

May

  • Leon Jacobs from Orange Cyberdefense’s SensePost team
  • Shaber Tseng
  • Nanyu Zhong of VARAS@IIE
  • Yassine Damiri
  • Chanhee Park (@ch4rli3kop), Dongjoo Kim (@d05004), Myounghun Song (@songmh0614), Seonghun Park (@qkrtjdgns147) from Computer Systems Security Lab, School of Cybersecurity, Korea University
  • Krishna Yadav (@xrishnayadav)

April

  • Quinn Nguyen from PawnCS
  • MrBruh
  • Marcin 'Icewall' Noga

March

  • Thomas 'TKYN' Keefer

February

  • Marcin 'Icewall' Noga
  • leeya_bug
  • Mounir Elgharabawy

Disclaimer

All aspects of the ASUS PSIRT (Product Security Incident Response Team) processes and policies may be adjusted based on specific circumstances and are subject to change without prior notice. We do not guarantee a response to any particular issue or category of issues. The use of the information in this document or any related links is at your own risk.

Contact Us

If you have any questions, concerns, feedback, or complaints regarding our Privacy Policy, or if you believe that ASUS has not complied with it, please do not hesitate contact us through 📧 privacy@stzgcm.com.