Back
Quotation Cart
No Selected Product.

Support

SUPPORT

Cybersecurity Vulnerabilities

How to Contact Us About Cybersecurity Vulnerabilities

 

Please inform us immediately if you find a potential vulnerability in Leonton’s products. For Leonton, timely detection of any vulnerabilities is what we do to safeguard the security of our products. You can report any potential cybersecurity vulnerabilities on Leonton products by sending an email to our PM Team and using Leonton’s PGP key to encrypt files.

 

When reporting cybersecurity vulnerabilities, please include the following details to facilitate our risk assessment and the subsequent development of remediation or mitigation measures:

  1. Product name and model
  2. Firmware/Software version
  3. Equipment and software needed to replicate issues
  4. Steps to recreate issues (attach pictures or codes if available)
  5. Proof-of-concept exploit code
  6. Description of how attackers can take advantage of the vulnerabilities
  7. Packet capture (use a tool like Wireshark to achieve this)
  8. Any other information you believe is relevant
  9. email address: support@leonton.com
  10. Download Leonton’s PGP key

 

Disclaimer

 

Depending on the circumstances of specific cases, the content of the ‘Cybersecurity Vulnerability Management Policy’ may be changed. We cannot guarantee specific issue responses or categories of issues. You will be responsible for any risks arising from using the information in this document or any content linked. Leonton reserves the right to revise any content in this document without prior notice. Any modifications in the document will be published on Leonton’s official website: www.leonton.com/cybersecurity.aspx

Cybersecurity advisories

Leonton will publish announcements about security concerns that pose moderate and high risks for our products.

2023
  • No security advisories issued.

We use cookies to provide a better experience. By proceeding, you agree to our Privacy Policy, including the use of cookies and other tracking technologies.

I Accept