ZTE’s Bug Bounty Programs reward finders of security vulnerabilities

bug bounty programs ZTE
What happens when a security researcher is rewarded by ZTE. Photo by monstArrr | Bigstock.com

In what can only be described as a bold move, ZTE Corporation has launched new Bug Bounty Programs to encourage security researchers and organizations worldwide to identify vulnerabilities in ZTE’s products and services.

ZTE Bug Bounty Programs cover four categories of products, specifically, the web application system including core applications and general applications, the wireline, the wireless, as well as the terminal such as mobile internet products. 

Wireline refers to fixed network optical access products, fixed network multi-service access networks (MSAN), fixed network terminals, and multi-media products while the wireless includes cloud core networks and wireless networks. 

In cases where there is a potential security vulnerability with  ZTE’s product or service as listed above, researchers or organizations can submit a report via email to ZTE PSIRT (Product Security Incident Response Team) at psirt@zte.com.cn. 

If the submitted vulnerability meets the awarding criteria specified in the bug bounty programs, the reporter may receive a bounty award in accordance with the program terms.

As an advocate for transparency and openness, ZTE has been committed to continuously improving the security of products and services, so as to provide users with a secure and reliable service experience. There is probably no better way to find any discrepancies or flaws than to offer rewards. Well done ZTE.

For further details, please click here

Be the first to comment

What do you think?

This site uses Akismet to reduce spam. Learn how your comment data is processed.