About NETGEAR Cash Rewards Program
NETGEAR’s mission is to be the innovative leader in connecting the world to the internet. To achieve this mission, we must earn and maintain our customers’ trust by protecting the privacy and security of their data.
This program encourages and rewards contributions by developers and security researchers who help make NETGEAR’s products more secure. NETGEAR provides monetary rewards and kudos for qualifying vulnerability submissions to this program. For submissions outside the scope of this program NETGEAR rewards Kudos points. Please click on the following link to the NETGEAR Kudos Rewards Program.
Arlo products have their own Bug Bounty program. Please click the following link to the Arlo Cash Rewards Program.
Only the following products are eligible for cash rewards:
|Product||Firmware||Web Management||Client Apps||Cloud Infrastructure|
|Nighthawk Pro Gaming Routers||X||X||X|
|Nighthawk Pro Gaming Switches||X||X||X|
|Insight Managed Smart Cloud Wireless Access Points||X||X||X||X|
Only the vulnerabilities found in the latest version of the above are eligible. To find the latest version, search by model number at NETGEAR Support. Targets listed below denote Cloud Infrastructure that support in-scope devices and are included in scope:
Out of Scope:
- All NETGEAR products and properties not explicitly denoted in Targets, excluding High Impact Submissions as described below
- All products covered by the Arlo Cash Rewards Program.
Priority and Reward Guidelines
The NETGEAR Product Security team, at their sole discretion, determine the nature and impact of the vulnerabilities disclosed including, but not limited to, leveraging CVSS rating methodology to identify the appropriate payouts.
The first valid submission to alert NETGEAR of a previously unknown issue qualifies for reward. Reward guidelines are based on the default configuration of devices, where applicable. NETGEAR builds products using a common platform and framework. Multiple products sometimes inherit the same vulnerability. When determining bounty rewards, NETGEAR grants a single reward that accounts for all affected products.
Note: NETGEAR uses CVSS to consistently score security vulnerabilities. Where discrepancies between the VRT and CVSS score exist, NETGEAR will defer to the CVSS score to determine the priority.
High Impact Rewards
NETGEAR rewards eligible submissions to researchers who report a vulnerability (or series of vulnerabilities) that demonstrably leads to one or more of the following results. NETGEAR includes all products and services in scope for these rewards. Cash Rewards will be awarded based on the following:
- Remote Unauthorized Access to administer a NETGEAR device (via the publicly accessible internet - e.g. not on the same LAN) with default device settings
- Remote Unauthorized Access to full NETGEAR database
- Duplicate reports of security issues, including security issues that have already been identified internally
- Attacks against NETGEAR AWS infrastructure
- Automated scanning attacks
- Social engineering (e.g. phishing, vishing)
- Physical attacks such as office access (e.g., open doors, tailgating)
- Distributed Denial of Service attacks and Denial of Service attacks
- UI, UX bugs, and spelling mistakes
- Usability issues
- Violations of licenses or other restrictions applicable to any vendor's product
- Vulnerabilities that are a result of malware
- Theoretical security issues with no realistic exploit scenario(s) or attack surfaces, or issues that would require complex end user interactions to be exploited, may be excluded
- Issues determined to be low impact may be excluded
- Discovery of any in-use service whose version contains known vulnerabilities (such as a specific version of OpenSSL, Apache, Tomcat, etc.) without a demonstration of intrusion, information retrieval, or service disruption using that vulnerability
- This program does not allow, without permission, researchers to leverage the findings of one vulnerability to create further exploits to then test normally inaccessible functionality, e.g. using leaked API keys or IP information for example. If you have any assumptions that a vulnerability can be leveraged to a greater degree, please request permission in your original report for the vulnerability
Legal Terms and Conditions
In addition to these Terms and Conditions regarding the NETGEAR Responsible Disclosure Program (the "Program"), there may be additional restrictions depending upon applicable local laws.
- The parties to this Agreement are you and NETGEAR.
- "NETGEAR" refers to NETGEAR, Inc. and its affiliates.
- By submitting the security bug, you affirm that you have not disclosed and agree that you will not disclose the security bug to anyone other than NETGEAR. Absent NETGEAR's prior written consent, any disclosure outside of this process would violate this Agreement. You agree that money damages may not be a sufficient remedy for a breach of this paragraph by you and that NETGEAR will be entitled to specific performance as a remedy for any such breach. Such remedy will not be deemed to be the exclusive remedy for any such breach but will be in addition to all other remedies available at law or equity to NETGEAR.
- By submitting information about a potential security bug, you are granting NETGEAR a worldwide, royalty-free, non-exclusive license to use your submission for the purpose of addressing security bugs in NETGEAR’s products and services.
- In the event of substantially duplicate submissions, NETGEAR may at its discretion provide a Reward only for the earliest received submission. Eligibility for Rewards, determination of the recipients, and amount of Reward is at the discretion of NETGEAR.
- If issues reported to our bug bounty program affect a third party or another vendor, NETGEAR reserves the right to forward details of the issue along to the party without further discussion with the researcher.
- You are responsible for all taxes associated with and imposed on any Reward you may receive from NETGEAR.
- You may only exploit, investigate, or target security bugs against your own accounts and/or your own devices. Testing must not violate any law, or disrupt or compromise any data or access data that is not yours; intentional access of customer data other than your own is prohibited.
- If you inadvertently access proprietary customer, employee, or business related information during your testing, the information must not be used, disclosed, stored, or recorded in any way. Inadvertent access of the data must be declared within your submission.
- Your testing activities must not negatively impact NETGEAR, NETGEAR’s products or services generally, or NETGEAR's online environment availability or performance.
- NETGEAR may choose not to remediate at its sole discretion.
- This Agreement constitutes the entire agreement of the parties with respect to the items listed above. This Agreement is covered by California law. This Agreement may be amended or modified only by a subsequent agreement in writing.
- If any portion of this Agreement is found to be illegal or unenforceable, then the parties will be relieved of their responsibilities arising under such portion, but only to the extent that such portion is illegal or unenforceable.
- You must not be the author of the code with the vulnerability.
- You must not be a NETGEAR employee, contractor, or a family member of an employee or contractor.
NETGEAR RESERVES THE RIGHT TO MODIFY OR CANCEL THE NETGEAR RESPONSIBLE DISCLOSURE PROGRAM AT ANY TIME WITHOUT NOTICE. ALL PARTICIPANTS AND SUBMISSIONS ARE STRICTLY VOLUNTARY. THIS OFFER IS VOID WHERE PROHIBITED BY LAW AND IN PARTICIPATING, YOU MUST NOT VIOLATE ANY LAW. YOU ALSO MUST NOT DISRUPT ANY SERVICE OR COMPROMISE ANYONE’S DATA.
This bounty follows Bugcrowd’s Public Disclosure Policy.
Requests to disclose the results of a submission will be considered on a case by case basis and require explicit prior written consent from NETGEAR.