Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

In general, the software or devices tested should not be production systems that support or have access to real data or users. When possible, dedicated, controlled testing environments should be established. Such a testing environment often consists of virtual machines (VMs) in a virtual network firewalled off from any production network. Even as a finder in a controlled testing scenario, you should keep in mind the potential for unintended consequences (i.e., the unknown unknowns). Always try to limit the potential for unintended negative impact of testing, even within your controlled environment. If the impact cannot be constrained to a controlled environment with relatively known consequences, do not attempt to test your exploit and instead report your findings directly to the vendor.

Safety Risk

...

Safety-critical

...

systems

...

have

...

been

...

defined

...

as

...

"systems

...

whose

...

failure

...

could

...

result

...

in

...

loss

...

of

...

life,

...

significant

...

property

...

damage,

...

or

...

damage

...

to

...

the

...

environment

...

[1]."

...

A

...

high

...

degree

...

of

...

caution

...

is

...

both

...

appropriate

...

and

...

necessary

...

when

...

testing

...

the

...

security

...

of

...

safety-critical

...

systems,

...

such

...

as

...

medical

...

devices,

...

industrial

...

equipment,

...

or

...

vehicles.

...

A

...

proof

...

of

...

concept

...

exploit

...

to

...

demonstrate

...

a

...

vulnerability

...

on

...

a

...

traditional

...

computer

...

might

...

cause

...

a

...

calculator

...

to

...

pop

...

up

...

on

...

the

...

screen.

...

A

...

proof

...

of

...

concept

...

exploit

...

on

...

a

...

car

...

might

...

cause

...

it

...

to

...

behave

...

erratically,

...

potentially

...

leading

...

to

...

injury

...

or

...

death.

...

Testing

...

or

...

demonstrating

...

safety-critical

...

systems

...

outside

...

a

...

controlled

...

environment,

...

or

...

when

...

there

...

is

...

any

...

chance

...

of

...

harming

...

unwitting

...

bystanders

...

is

...

unacceptable

...

under

...

any

...

circumstances.

Legal Risk

...

Depending on the circumstances,

...

finders

...

may

...

be

...

subject

...

to

...

a

...

non-disclosure

...

agreement

...

(NDA)

...

regarding

...

any

...

vulnerabilities

...

found.

...

This

...

is

...

often

...

the

...

case

...

when

...

vulnerability

...

testing

...

is

...

performed

...

on

...

behalf

...

the

...

vendor

...

whether

...

directly

...

as

...

an

...

employee,

...

or

...

under

...

contract

...

as

...

part

...

of

...

a

...

consulting

...

firm

...

or

...

as

...

a

...

freelance

...

consultant.

...

Finders

...

should

...

be

...

aware

...

of

...

this

...

possibility

...

and

...

consider

...

the

...

legal

...

implications

...

of

...

any

...

relevant

...

NDAs

...

before

...

reporting

...

a

...

vulnerability

...

to

...

any

...

third

...

party.

...



That

...

said,

...

vendors

...

are

...

strongly

...

encouraged

...

to

...

avoid

...

requiring

...

NDAs

...

of

...

reporters

...

if

...

at

...

all

...

possible.

...

Many

...

finders

...

prefer

...

to

...

avoid

...

the

...

legal

...

entanglements

...

that

...

NDAs

...

entail

...

and

...

will

...

be

...

discouraged

...

from

...

reporting

...

vulnerabilities

...

when

...

an

...

NDA

...

is

...

involved.

...

  This

...

can

...

leave

...

vendors

...

unaware

...

of

...

potential

...

threats

...

to

...

their

...

products

...

and

...

services

...

and

...

in

...

turn,

...

their

...

users.

...



Additionally,

...

in

...

some

...

environments,

...

such

...

as

...

medical

...

devices,

...

healthcare,

...

education,

...

or

...

financial

...

information

...

systems,

...

there

...

may

...

be

...

legal

...

consequences

...

to

...

accessing

...

real

...

data

...

(under

...

HIPAA

...

[2],

...

FERPA

...

[3],

...

COPPA

...

[4],

...

and

...

similar

...

laws,

...

industry

...

standards

...

such

...

as

...

PCI

...

DSS

...

[5],

...

etc.),

...

so

...

we

...

again

...

reiterate

...

the

...

need

...

to

...

perform

...

research

...

only

...

in

...

controlled

...

test

...

environments,

...

preferably

...

with

...

fake

...

data.

...



For

...

more

...

information

...

on

...

the

...

legal

...

implications

...

of

...

vulnerability

...

disclosure,

...

we

...

refer

...

you

...

to

...

the

...

EFF's

...

_Coders'

...

Rights

...

Project

...

Vulnerability

...

Reporting

...

FAQ_

...

[6].

.References

  1. J. C. Knight, "Safety critical systems: challenges and directions," in ICSE '02 Proceedings of the 24th International Conference on Software Engineering, Orlando, 2002.
  2. U.S. Department of Health & Human Services, "Health Information Privacy," [Online]. Available: https://www.hhs.gov/hipaa/. [Accessed 23 May 2017].
  3. U.S. Department of Education, "Family Educational Rights and Privacy Act (FERPA)," [Online]. Available: https://ed.gov/policy/gen/guid/fpco/ferpa/index.html. [Accessed 23 May 2017].
  4. Federal Trade Commission, "Children's Online Privacy Protection Rule ("COPPA")," [Online]. Available: https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule. [Accessed 23 May 2017].
  5. PCI Security Standards Council, "PCI Security," [Online]. Available: https://www.pcisecuritystandards.org/pci_security/. [Accessed 23 May 2017].
  6. Electronic Frontier Foundation, "Coders' Rights Project Vulnerability Reporting FAQ," [Online]. Available: https://www.eff.org/issues/coders/vulnerability-reporting-faq. [Accessed 17 May 2017].