Fiat Chrysler Automobiles values engaging third party researchers to improve our products making them safer and more reliable. We have committed to formal recognition and compensation for discovery of reproducible and legitimate vulnerabilities, provided they are disclosed responsibly. Our goal with the Bug Bounty project is to foster a collaborative relationship with researchers to participate in responsible disclosure of vulnerabilities in FCA’s vehicles and connected services.
Responsible Disclosure Guidelines:
We will investigate legitimate reports and make every effort to correct any valid vulnerability as quickly as possible. In the spirit of encouraging responsible disclosure and reporting, we will not take legal action against nor ask law enforcement to investigate researchers participating in the program provided their compliance with the following Responsible Disclosure Guidelines:
This program is focused on the security of FCA’s connected vehicles, including the systems within them, and the external services and applications that interact with them.
Only the targets below are in scope -- DO NOT test anything outside of the specific domains/targets listed here:
Target name | Type
Vehicle Head Units, TPMS sensors, remote keyless entry, and any other system
that is present in a hardware product that you own or are authorized to test
against | Other
www.driveuconnect.com | Website
<https://itunes.apple.com/us/app/uconnect/id1229236724?mt=8> | iOS
<https://itunes.apple.com/pl/app/panda-uconnect/id1117321678?mt=8> | iOS
<https://itunes.apple.com/gb/app/uconnect-live/id881830261?mt=8> | iOS
www.driveuconnect.eu | Website
Target name | Type
m.driveuconnect.eu | Other
Only the above domains and applications are in scope for the program. If the domain is not explicitly listed here, it is not considered in scope for the program and should NOT be tested.
Before doing any testing that requires a Uconnect account, please create a test account that ends in @bugcrowdninja.com so that we know your activities are part of the Bug Bounty Program.
You can register for a new Uconnect account at: https://www.mopar.com/en-us/sign-in.html
This program uses a modified version of the standard priority guidelines presented in Bugcrowd's Vulnerability Rating Taxonomy.
Fiat Chrysler Automobiles websites not affiliated with connected vehicle platforms, including brand, blog, and social media sites are explicitly out of scope. This includes brand sites, dealer websites, or marketing sites. Some examples of out-of scope sites are listed below; this is by no means an exhaustive list.
The website list below that are linked in DriveUconnect are Out-Of-Scope including all brands site (different for country and language)
When conducting vulnerability research according to this policy, we consider this research to be:
Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or
similar state laws), and we will not initiate or support legal action against
you for accidental, good faith violations of this policy;
Exempt from the Digital Millennium Copyright Act (DMCA), and we will not bring a claim against you for circumvention of technology controls;
Exempt from restrictions in our Terms & Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy; and
Lawful, helpful to the overall security of the Internet, and conducted in good faith.
You are expected, as always, to comply with all applicable laws.
If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through one of our Official Channels before going any further.
This program follows Bugcrowd’s standard disclosure terms.
This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.
|Scope Type||Scope Name|
Vehicle Head Units, TPMS sensors, remote keyless entry, and any other system that is present in a hardware product that you own or are authorized to test against
|Scope Type||Scope Name|
The progam has been crawled by Firebounty on 2016-07-21 and updated on 2019-09-17, 118 reports have been received so far.