Bug Bounty: Ready for more cybersecurity

With our Bug Bounty programme, we are the first company in Switzerland to support the reporting and quick resolution of security loopholes (bugs) in our products and services. We invite both private individuals and organisations to report weak points to our Computer Security Incident Response Team (CSIRT).

Report security bugs

Please report any security vulnerability directly on our portal:

Bug Bounty Portal

For any other inquiries regarding the Bug Bounty programme please contact us by e-mail:


PGP key id 350B4B73FA225C67
PGP fingerprint 28E7 E4D0 7ED7 9083 A93C  03B2 350B 4B73 FA22 5C67
PGP public key public key
Postal address
Swisscom (Switzerland) Ltd
Alte Tiefenaustrasse 6
CH-3048 Worblaufen

Report content

Your report must contain all the information we need to confirm the vulnerability. This includes:

  • type of security vulnerability
  • exact details of the product/service concerned
  • clear and comprehensible description of the vulnerability and all information necessary to identify the affected system
  • potential exploitation of the vulnerability must be clearly verifiable, for example with step by step instructions
  • additional information such as PoC scripts, screenshots, HTTP requests etc.

Reports about the following issues and systems are considered irrelevant:

  • The absence of a security feature alone or disclosure of too much non-sensitive information do not constitute a security vulnerability. Examples:
    •   Information Disclosure without disclosing sensitive data
    •   Clickjacking
    •   Open Redirects
  • Issues about systems with these domains:
    •   *.cust.swisscom.ch
    •   *.pub.wingo.ch and
    •   *.cust.wingo.ch
  • Reports about Fastweb

Basic principle

All those involved in the collaboration between Swisscom and the security community observe the following rules:

  • vulnerabilities are handled in accordance with the principle of responsible disclosure (see below)
  • only Swisscom is notified
  • all activities leading to the discovery of a security gap are conducted within the bounds of the law
  • bounties may be awarded. The bounty amount depends on the criticality of the vulnerability and on the quality of the documentation provided to Swisscom.

Responsible disclosure

Swisscom's understanding of responsible disclosure:

  • Swisscom has sufficient time, typically at least 90 days, to verify and eliminate the vulnerability.
  • The tests must not impair Swisscom services and products
  • Third-party data may not be spied out or disclosed
  • No third parties should be informed about the vulnerability
  • Claims related to the reporting of a vulnerability will not be considered.


Swisscom CSIRT bears responsibility for a standardised procedure that accepts externally reported security vulnerabilities, remediates and publishes them in a coordinated manner as appropriate.

Remediated security vulnerabilities

ID Product concerned Credits
Swisscom Internet-Box Martin Jindra – digi.ch GmbH
Swisscom Centro Grande,
Swisscom Centro Business
Cyril Mueller
SCBB-2986 Tufin Secure Change Raphaël Arrouas
SCBB-2629 Swisscom Internet Box Matthias Galliker
CVE-2018-16596 Swisscom Internet-Box Michael Mazzolini – GoldNetwork






myStrom WiFi Product Line Jan Almeroth (@almeroth)
CVE-2018-13108 Centro Business (ADB) Johannes Greil (Office Vienna), SEC Consult Vulnerability Lab
CVE-2018-6765 Swisscom MySwisscomAssistant Kushal Arvind Shah, Fortinet FortiGuard Labs
CVE-2018-6766 Swisscom TVMediaHelper Kushal Arvind Shah, Fortinet FortiGuard Labs
CVE-2016-10042 Swisscom Internet Box (Arcadyan) Mateusz Khalil
2016-6270433 Swisscom DSL Router Centro Grande (ARRIS/Motorola) Matthias Galliker
CVE-2015-6498 Home Device Manager, Alcatel-Lucent Dr. Ulrich Fiedler,
BFH-TI Biel/Bienne
CVE-2015-1188 Swisscom DSL Router Centro Grande (ADB), ADB Ivan Almuina
CVE-2015-1187 D-Link DIR636L, D-Link Tiago Caetano Henriques
CVE-2014-3809 1830 Photonic Service Switch, Alcatel-Lucent Stephan Rickauer