Vulnerability Disclosure
  • 19 Dec 2023
  • 2 Minutes to read

Vulnerability Disclosure

Article summary

Submitting a Vulnerability Report

To submit a vulnerability report to the Nexudus Security team, please email us at We will use the criteria detailed below to prioritize and triage all submissions.

Preference, Prioritization, and Acceptance Criteria

What we want to see from you

  • Clear and well-written reports in English

  • Reports that include proof-of-concept code equip us to better triage.

  • Reports that include only crash dumps or other automated tool output may receive lower priority.

  • Reports that include products not on the initial scope list may receive lower priority.

  • Reports must not include purely security best practices or the output of automated tooling such as NMAP, Nessus or Tenable.

  • Please include how you found the bug, the impact, and any potential remediation.

  • Please include any plans or intentions for public disclosure.

  • If an exploit has been identified, any proof of concept must not actively exfiltrate any company or customer data, establish persistence or a backdoor or pivot across other company systems for further exploitation.

  • The issue must only be reported to Nexudus representatives and no other party.

Any security research you carry out must NOT include:

  • DDOS or service availability testing,
  • Physical access security testing, including tailgating, dumpster diving or any form of physical access testing,
  • Social engineering testing such as phishing campaigns and coercion against staff
The Nexudus Vulnerability Disclosure Program (VDP) is not a Bug Bounty program.

As such, Nexudus does not have any type formalized process for monetary reward for this disclosure process at this time. Nexudus may also not publicly acknowledge that a legitimate vulnerability disclosed has been identified or remediated against.

What you can expect from Nexudus

  • A timely response to your email within 2 business days.

  • After triage, we will send an expected timeline, and commit to being as transparent as possible about the remediation timeline as well as on issues or challenges that may extend it.

  • An open dialog to discuss issues.

  • Notification when the vulnerability analysis has completed each stage of our review.

  • Credit after the vulnerability has been validated and fixed.

If we are unable to resolve communication issues or other problems, Nexudus may bring in a neutral third party to assist in determining how best to handle the vulnerability.

Nexudus will not engage in legal action against individuals who submit good-faith vulnerability reports within the bounds of our Vulnerability Disclosure Program at We openly accept vulnerability reports for Nexudus products currently listed on our website

This includes not pursuing legal action against individuals who:

  • Engage in testing of systems/research without harming Nexudus or its customers.

  • Engage in vulnerability testing within the scope of our vulnerability disclosure program.

  • Test on products without affecting customers, or receive permission/consent from customers before engaging in vulnerability testing against their devices/software, etc.

  • Adhere to the laws of their location and the location of Nexudus, such as the Computer Misuse Act 1990.

For example, violating laws that would only result in a claim by Nexudus (and not a criminal claim) may be acceptable as Nexudus is authorizing the activity (reverse engineering or circumventing protective measures) to improve its system.

  • Refrain from disclosing vulnerability details to the public before a mutually agreed-upon timeframe expires.

Was this article helpful?
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.