Acer is committed to designing products and services that adhere to the highest security standards. In an effort to better protect our customers and their data, we are welcoming any information about potential security vulnerabilities from security researchers, academics, and other members of the security community.
We are ready to work with those who bring such vulnerabilities to our attention and will acknowledge all relevant submissions. Acer will only validate vulnerabilities that are reproducible using the most current software versions available at https://support.acer.com.
Vulnerabilities should be submitted to vulnerability@acer.com and should include the following items:
- Name
- Country/Region
- Product or software containing the vulnerability
- Product serial number (if applicable)
- A complete description of the vulnerability
- The steps required to reproduce the vulnerability
You will receive an acknowledgement of receipt of your vulnerability report within 48 hours, and you will be provided with an initial status update within 7 working days.
Acer may not be able to evaluate submissions that are incomplete or that do not include the information requested above. By submitting a vulnerability, you are agreeing to Acer’s Privacy Policy.
Note: Requests for support should be directed to https://support.acer.com. Support requests received through the email address vulnerability@acer.com will not be responded to.
Important: Acer recommends submitters utilize Acer Product Security PGP key to encrypt for emails that contain sensitive information. Please use the public key below to encrypt your vulnerability submission. Public key: Click here to download Key ID: A6CCE38A
Fingerprint: 79FE 9FF2 EEA3 7BB2 4790 1792 B351 3BC4 A6CC E38A |
---|
|