Qualcomm takes security very seriously and we strive to address any security-related issues quickly and appropriately. If you have found a potential security issue in any Qualcomm product or software, please contact us via email: email@example.com. Or use the form below. For encrypted communication, you may use our public key.
Qualcomm Technologies, Inc. (QTI), has its vulnerability rewards program designed to expand collaboration with invited security researchers who improve the security of the Qualcomm® Snapdragon™ family of processors, 5G modems and related technologies. The program is administered in collaboration with vulnerability coordination platform HackerOne. Security researchers who submit high-quality issues may be invited to join Qualcomm’s Vulnerability Reward Program. Researchers with a proven history of submitting high-quality issues in other areas may be invited to join the Program; we encourage such individuals to reach out to us at firstname.lastname@example.org. See Report a vulnerability below.
Please refer to the below information for encrypted communication of product security issues to email@example.com.
key fingerprint 59E1 E299 5B9D E4C5 9D48 EBDF 052C 3C28 CE56 47CD
uid Qualcomm Product Security Team – 2017
firstname.lastname@example.org 2017-05-09 [expires: 2020-05-08]
We aim to address security issues and communicate them to our stakeholders within 90 days (e.g. through security bulletins). While we strive to meet this deadline every time, the complexity and the large number of products and product lines that we support may prevent us from doing so. We will do our best to keep you updated throughout this process when appropriate.
We respect privacy, if you wish to stay anonymous, we will not have further records of your name or identity in any further communication regarding the matter.
If you have found a potential security issue in any Qualcomm® product or software, please contact us via email: email@example.com. People who submit high-quality reports are often invited to our Vulnerability Rewards Program. You may also request to be invited even without submitting a report first, if you send us some references (CVE ID, IDs with public references from other programs) that provide evidence that you already successfully submitted vulnerability reports to other programs. Please contact us via firstname.lastname@example.org to request an invitation. For encrypted communication, you may use our public key. We will do our best to respond within a maximum of 48 hours. But if you do not receive a response within this time frame, please feel free to follow up with us to ensure that we have received your original report.
The following information will help us to evaluate your submission as quickly as possible. If available, please include in your report:
Publication of Vulnerabilities
We regularly issue security bulletins to our customers in order to share security vulnerabilities and related code modifications. As an active member of Code Aurora Forum (CAF), Qualcomm Innovation Center, Inc. also shares reports of security vulnerabilities with CAF and the open source community. Such communications will oftentimes include description of issues, their severity based on our vulnerability rating guidelines and attributions to reporters of those vulnerabilities unless those reporters request otherwise.