We consider that the safety and security of our customers is one of the top priorities. Therefore, we design and make products and services with the best quality and reliability possible. Despite our efforts to implement the best possible security measures, vulnerabilities may still be present in our products, services and systems.
This document describes Renault’s policy for receiving reports related to potential security vulnerabilities in its products and services and the company’s standard practice with regards to informing customers of verified vulnerabilities.
Everyone is encouraged to report identified vulnerabilities, regardless the type of service or products. Researchers, partners, CERTS, customers or any other source are welcomed to report the vulnerabilities.
The preferred method for contacting Groupe Renault security operational team is by sending email to firstname.lastname@example.org if you have identified a potential security vulnerability with one of our products or our services.
To facilitate our management of the vulnerability, we expect some well-written reports in English or French containing the following information:
Please do not include personal data in your reports, except what is necessary to contact you.
Participating in this program does not give you any right to intellectual property owned by Groupe Renault or a third party.
After your incident report is received, the appropriate personnel will contact you to follow-up. To ensure confidentiality, we encourage you to encrypt any sensitive information you send to us via e-mail. We are equipped to receive messages encrypted using PGP. Our PGP public key can be used to send encrypted email.
Groupe Renault attempts to acknowledge receipt to all submitted reports within seven days.
Then Groupe Renault will engage an open dialog to discuss issues, notify you at each stage of the investigation.
Groupe Renault retains discretion to determine whether to accept a report into the program. For example, Groupe Renault will not accept into this program vulnerabilities with minimal security impact or low exploitability, vulnerabilities beyond Renault’s control, vulnerabilities discoverable through automated scans which have not been verified manually, or vulnerabilities related to a violation of the program requirements.
The email@example.com email address is intended ONLY for the purposes of reporting product or service security vulnerabilities. It is not for technical support information on our products or services. All content other than that specific to security vulnerabilities in our products or services will not be processed.
Groupe Renault agrees not to pursue legal action against reporting parties who submit in-scope reports and:
The reporting party(s) who submits a report to Groupe Renault through this website agrees not to disclose to a third-party any information related to that report, the vulnerability reported, nor the fact that a vulnerability has been reported to Renault. This agreement regarding disclosure applies regardless of whether Groupe Renault had prior knowledge of the information.
You agree that Groupe Renault may disclose the information in a report you submit through this website. Groupe Renault will consider any request from a reporting party to make a disclosure, but reserves the right to deny such requests.
Groupe Renault appreciates the efforts made by the reporting party in identifying the vulnerability. We thank you for going out of your way to improve the security of our product and systems and the Internet community as a whole.
All aspects of this process are subject to change without notice, as well as to case-by exceptions. No particular level of response is guaranteed for any specific issue or class of issues.
This program crawled on the 2020-03-04 is sorted as cvd.