ExpressVPN operates thousands of VPN servers and makes cross-platform VPN applications for all major desktop and mobile operating systems as well as routers and browser extensions.
ExpressVPN takes the security of its applications and services seriously. We've offered an in-house bug bounty program for years and paid out thousands of dollars to security researchers in that time. We value excellent engineering and are always looking for ways to improve the security of our products and services.
We have designed our ExpressVPN VPN servers to be secure and resilient. We even have an audited design called TrustedServer that dramatically improves the security posture of our servers. We’re confident in our work in this area and aim to ensure that our VPN servers meet our security expectations. As such, we’re inviting our researchers to focus testing on the following types of security issues within our VPN servers:
To make this challenge more enticing, we are introducing the following bonus: the first person to submit a valid P1-P2 vulnerability, granting unauthorized access or exposing customer data, will receive an additional $10,000 USD bonus bounty. This limited-time bonus will be valid until the prize has been claimed.
Please ensure that your activities remain in-scope to the program. For example, admin panels for data center services we utilize are out of scope because they are not owned, hosted, and operated by ExpressVPN. If you are unsure if your testing is considered in-scope please reach out to support@bugcrowd.com to confirm first. A researcher found to be testing out of scope will be ineligible for a reward and we will reserve the right to immediately remove you from the program.
For the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.
This program follows Bugcrowd’s standard disclosure terms.
For any testing issues (such as broken credentials, inaccessible application, or Bugcrowd Ninja email problems), please email support@bugcrowd.com. We will address your issue as soon as possible.
This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.
Scope Type | Scope Name |
---|---|
android_application | ExpressVPN Android application |
api | ExpressVPN APIs |
ios_application | ExpressVPN iOS application |
undefined | MediaStreamer DNS servers |
undefined | ExpressVPN Firefox extension |
undefined | ExpressVPN Chrome extension |
undefined | VPN servers |
undefined | ExpressVPN Linux application |
undefined | ExpressVPN macOS application |
undefined | ExpressVPN Windows application |
undefined | ExpressVPN Router |
undefined | Apple App Store (886492891) |
undefined | Lightway Core |
web_application | *.expressvpn.com |
web_application | www.expressvpn.com |
web_application | *.xvservice.net |
web_application | *.xvtest.net |
web_application | expressobutiolem.onion |
web_application | Google Play (com.expressvpn.vpn) |
This program crawled on the 2020-07-14 is sorted as bounty.
FireBounty © 2015-2024