Introduction 

Here, we outline the standardized process for submitting Vulnerability Assessment and Penetration Testing (VAPT) reports related to our products.   

Reporting Vulnerability 

If you identify a vulnerability in our products, please submit a detailed report via our Support Portal.  

Steps submit a VAPT report:

1. Identify the Vulnerability – Conduct a thorough analysis to pinpoint the specific issue. If using automated tools, remove false positives and prioritize the vulnerabilities. 

2. Gather Ncessary Information like:

  • Product name and version
  • Specifics of the vulnerability
  • Other relevant contextual information.  


Minimum Details required to better analyze the security issue: 


1. Environment Information: 

  • HySecure gateway version 
  • Details of patches applied on the gateway 

2. Description of the vulnerability or security issue. 

3. Affected module, system, or feature. 

4. Reproduction Steps: 

  • Clear, step-by-step instructions to reproduce the issue. 
  • Test data or payloads used. 

5. Impact Assessment: 

  • Data at risk (e.g., user information, credentials). 
  • Systems or users potentially impacted. 
  • Severity 
  • Details on Exploitability 
  • Data at risk (e.g., user information, credentials). 
  • Systems or users potentially affected. 
  • Severity assessment and exploitability details. 
  • Access level required for exploitation. 
  • Exploitability over the network, physical access, or application component. 
  • Conditions necessary to trigger vulnerability. 
  • Availability of Proof of Concept (PoC) exploits. 
  • Actions an attacker can perform post-exploitation. 
  • Detectability of exploitation. 


Submission Format: 

Reports should be submitted using the following Sample VAPT Report Sheet. 

Note: A detailed Proof of Concept (PoC) with clear exploitation steps significantly helps us evaluate the issue and provide an effective resolution. 

Ensuring Product Updates:

Customers are encouraged to use the latest version of our products to avoid known issues. Check the latest updates here.  . 


The following issues are considered out of scope: 

  • Self-exploitation scenarios (e.g., self-XSS, cookie reuse, self-DOS).
  • Attacks requiring MITM or physical access.

  • Clickjacking on non-sensitive pages unless a PoC demonstrates a meaningful exploit. 

  • CSRF vulnerabilities in non-critical actions. 

  • Blind SSRF without a working PoC. 

  • Lack of security headers without direct impact.

  • Version number-based vulnerability claims without PoC. 

  • Invalid/missing SPF/DKIM records with no demonstrated risk. 

  • Disclosure of static resources or public information. 

  • Security weaknesses without practical impact. 


Submission Channels

Via Support Ticket: Submit a request on support.accops.com with all relevant details. 

Via Email: Send your report to [email protected]. 


Service Level Agreements (SLA) for Reported Vulnerabilities

Priority*SLA  for Accops ProductsSLA for Open Source or 3rd Party modules
Critical 
Mitigation or Permanent fix within 15 days
15 days post validated fix available
High 
Mitigation or Permanent fix within 30 days
30 days post validated fix available 
Medium 
Mitigation or Permanent fix within 60 days
60 days post validated fix available
Low 
Mitigation or Permanent fix within 180 days
180 days post validated fix available


*Priority is determined based on the severity, exploitability and impact of the vulnerability on Accops products. 



Best regards,

Accops Systems Private Limited