Security Issue Reporting Guidelines
Steps to report a vulnerability.
product-security@traka.com
Please encrypt your e-mail with PGP and this public key
Please include the information below in your e-mail report:
- First and last name
- Company name
- Contact phone number (optional)
- Preferred e-mail contact
- General description of vulnerability
- Product containing vulnerability (hardware & software versions), part numbers
- Tools, hardware and other configurations required to trigger the event
- Any security or service pack updates applied
- Document instructions to reproduce the event
- Sample code, proof of concept or executable used to produce event
- Definition of how the vulnerability will impact a user including how the attacker could breach security on-site
- Affected product
- System details (develop for range of ASSA ABLOY Global Solutions Hospitality products)
- Technical description and steps to reproduce
- PoC (link)
- Other parties and products involved
- Disclosure plans/dates/drivers
- What was the purpose and scope of research being performed when found (context)?
Select topic
Reporting Guidelines
Please report any potential or real security vulnerability claim to the Traka Product Security Team via e-mail.
Disclosure Policy
Traka values insight from the security research community and welcomes disclosure and collaboration with this community.
Product Security Advisories
Documentation related to Traka Product Security Advisories.