Skip to content
Residential
Business
Residential
Business
Building your order...
+
Purple banner placeholder

Astound Security: Responsible Disclosure Policy

Responsible Disclosure

Astound believes effective responsible disclosure of security vulnerabilities requires mutual trust, respect, and transparency between Astound and Security Researchers. Together, we promote the continued security and privacy of Astound customers, products, and services.

Vulnerability Reporters

Astound accepts vulnerability reports from all sources. Astound defines a security vulnerability as an unintended condition that could be exploited to compromise the integrity, availability or confidentiality of our products, services, or confidential information.

Astound’s Commitment to and requests of Vulnerability Reporters

  • We maintain trust, respect and confidentiality in our exchanges with security researchers. We ask that you do the same by giving Astound the time to investigate your report and mitigate any vulnerability without disclosing the vulnerability publicly.
  • We will work with you to validate reported vulnerabilities in accordance with our commitment to security and privacy. We ask that you do the same by providing us with information that will further our understanding and investigation of your report.
  • We investigate and remediate issues in a manner consistent with helping to protect the safety and security of those potentially affected by a reported vulnerability. We ask that Vulnerability Reporters refrain from public disclosure of the reports until this process has been completed.

Vulnerability Reporting

Astound recommends that Vulnerability Reporters share the details of any suspected vulnerabilities using the web form below. The Astound Security team will conduct a thorough investigation, contact you for any clarification or additional data if required, and then take appropriate action for resolution. To encrypt a submission via email, use the public key provided on this page.

All fields are required unless indicated as optional.

  • Help us get an idea of what this vulnerability is about.
  • Describe the vulnerability and its impact. Provide a proof of concept or replication steps.
  • Encryption

    Alternatively, you may send vulnerability submissions or questions to the Astound Security Team via email to security@lists.astound.com. Encryption key provided below:

    —–BEGIN PGP PUBLIC KEY BLOCK—–

    mDMEYryC+BYJKwYBBAHaRw8BAQdAm59f9XVWg6HG7ds2mpjo6PljqTvLkGyqIKId
    uAx6ECO0LUFzdG91bmQgU2VjdXJpdHkgPHNlY3VyaXR5QGxpc3RzLmFzdG91bmQu
    Y29tPoiUBBMWCgA8FiEEvYd1ZsRquw6Uh8QQRF9y8gHdYzMFAmK8gvgCGwMFCwkI
    BwIDIgIBBhUKCQgLAgQWAgMBAh4HAheAAAoJEERfcvIB3WMzTBEBAPnOWNBGOf3y
    LltVG5+KjhPp2229DSFn2ODQZMOEn6WtAP9GkYvYOTOzHwl4oRU9WmQ7U8tFNfkr
    kpK9yQ3jGsUPBLg4BGK8gvgSCisGAQQBl1UBBQEBB0CDe7K7+woo74cU6d7e2n3v
    jJeMOfF54F3tWmHPik/AbwMBCAeIeAQYFgoAIBYhBL2HdWbEarsOlIfEEERfcvIB
    3WMzBQJivIL4AhsMAAoJEERfcvIB3WMzStoBAJbXLvDMF3RmgbxT3rJunpibHN4X
    hv+D9Zb6Csxmb7d7APwItuibme7ollZTHkDmtYDXhebpZVI7xvCw5tPDyvlZAg==
    =fo7G
    —–END PGP PUBLIC KEY BLOCK—–