Meta navigation

Bug Bounty

Bug Bounty: closes security gaps

Our Bug Bounty programme supports the reporting and quick elimination of security gaps (bugs) in our products and services. We invite both private individuals and organisations to report weak points to our Computer Security Incident Response Team (CSIRT).

Report security gaps

Please report any security vulnerability directly on our portal:

Bug Bounty Portal

For any other inquiries regarding the Bug Bounty programme please contact us by e-mail:

PGP key id 679603F0
PGP fingerprint A387 0022 1F33 4B4B 77F5 DFE3 E372 59A7 6796 03F0
PGP public key public key
Postal address
Swisscom (Switzerland) Ltd
Pfingstweidstrasse 51
CH-8005 Zurich

Report content

Your report must contain all the information we need to confirm the vulnerability. This includes:

  • type of security vulnerability
  • exact details of the product/service concerned
  • clear and comprehensible description of the vulnerability and all information necessary to identify the affected system
  • potential exploitation of the vulnerability must be clearly verifiable, for example with step by step instructions
  • additional information such as PoC scripts, screenshots, HTTP requests etc.

Reports about the following issues and systems are considered irrelevant:

  • The absence of a security feature alone or disclosure of too much non-sensitive information do not constitute a security vulnerability. Examples:
    •   Information Disclosure without disclosing sensitive data
    •   Clickjacking
    •   Open Redirects
  • Issues about systems with these domains: *
  • Reports about Fastweb

Basic principle

All those involved in the collaboration between Swisscom and the security community observe the following rules:

  • vulnerabilities are handled in accordance with the principle of responsible disclosure (see below)
  • only Swisscom is notified
  • all activities leading to the discovery of a security gap are conducted within the bounds of the law
  • bounties may be awarded. The bounty amount depends on the criticality of the vulnerability and on the quality of the documentation provided to Swisscom.

Responsible disclosure

Swisscom's understanding of responsible disclosure:

  • Swisscom has sufficient time, typically at least 90 days, to verify and eliminate the vulnerability.
  • The tests must not impair Swisscom services and products
  • Third-party data may not be spied out or disclosed
  • No third parties should be informed about the vulnerability
  • Claims related to the reporting of a vulnerability will not be considered.


Swisscom CSIRT bears responsibility for a standardised procedure that accepts externally reported security vulnerabilities, remediates and publishes them in a coordinated manner as appropriate.

Remediated security vulnerabilities

ID Product concerned Credits
CVE-2016-10042 Swisscom Internet Box (Arcadyan) Mateusz Khalil
2016-6270433 Swisscom DSL Router Centro Grande (ARRIS/Motorola) Matthias Galliker
CVE-2015-6498 Home Device Manager, Alcatel-Lucent Dr. Ulrich Fiedler,
BFH-TI Biel/Bienne
CVE-2015-1188 Swisscom DSL Router Centro Grande (ADB), ADB Ivan Almuina
CVE-2015-1187 D-Link DIR636L, D-Link Tiago Caetano Henriques
CVE-2014-3809 1830 Photonic Service Switch, Alcatel-Lucent Stephan Rickauer