Motorola Solutions appreciates researchers following responsible disclosure practices and not prematurely revealing vulnerability information during the time required to address a problem. Premature public disclosure can place our customers and users at increased levels of risk.
SUBMIT SECURITY VULNERABILITY INFORMATION ONLY
This page is only for researchers who have information about Motorola Solutions security vulnerabilities. Please direct other inquiries such as the following through normal Motorola Solutions Support channels:
|•||A request for product repair|
|•||Help with installation, configuration, or operational questions|
|•||A functional software bug|
|•||A new product or feature recommendation|
|•||A comment on a product or feature|
HOW TO SUBMIT A SUSPECTED SECURITY VULNERABILITY
A security vulnerability is a condition in a system or a device that can be exploited to violate its intended behavior, relative to confidentiality, integrity or availability.
|•||For Motorola customers: Please provide vulnerability inputs through your normal service support process. This will reduce the time is takes to reach the proper team.|
|•||For independent researchers: You may submit a security vulnerability by email or phone: Email: email@example.com (Please encrypt sensitive information) Telephone: +1.866.343.5220 (In the U.S.); +1.302.444.9838 (All other locations)|
To help us better address your discovery, please include the following information:
|•||Contact information: Your name, telephone number and email address|
|•||Product impacted: Model number and software version, if available|
|•||Vulnerability: Please provide a description of the vulnerability|
|•||Details: Information on how to create an exploit. Are you aware of an active exploit?|
|•||Disclosure: Have you disclosed your findings to anyone other than Motorola? If so, to whom?|
WHAT TO EXPECT AFTER YOU PROVIDE YOUR INPUT
Please allow up to five business days for an acknowledgment of your input. This time will allow us to be sure your input is forwarded to the appropriate design teams. If, for any reason, you do not receive an acknowledgment, please contact us again to ensure your input has not been lost.
After a patch or work-around has been distributed, Motorola Solutions will acknowledge researchers who do not prematurely disclose vulnerability information and who do not publish details that could be used to create an exploit.
SECURITY VULNERABILITY: CONTACT US
Researchers may submit security vulnerability information to Motorola Solutions via email or phone:
|•||Email: firstname.lastname@example.org (Please encrypt sensitive information)|
|•||Telephone: +1.866.343.5220 (In the U.S.); +1.302.444.9838 (All other locations)|