52235 policies in database
Link to program      
2016-12-06
2019-08-03
Nintendo logo
Thank
Gift
HOF
Reward

Reward

100 $ 

Nintendo

Nintendo’s goal is to provide a secure environment for our customers so that they can enjoy our games and services. In order to achieve this goal, Nintendo is interested in receiving vulnerability information that researchers may discover regarding Nintendo’s platforms. Currently, in the context of the HackerOne program, Nintendo is only interested in vulnerability information regarding the Nintendo Switch™ family of systems and is not seeking vulnerability information regarding other Nintendo platforms, network service, or server-related information.

Below are examples of types of activities that Nintendo is focused on preventing:

  • Piracy, including:

    • Game application dumping

    • Copied game application execution

  • Cheating, including:

    • Game application modification

    • Save data modification

  • Dissemination of inappropriate content to children

Below are examples of vulnerabilities that Nintendo is interested in receiving information about:

  • System vulnerabilities regarding the Nintendo Switch family of systems

    • Privilege escalation from userland

    • Kernel takeover

    • ARM® TrustZone® takeover

  • Vulnerabilities regarding Nintendo-published applications for Nintendo Switch

    • Userland takeover
  • Low-cost cloning

  • Security key detection via information leaks

Nintendo reserves the right to choose whether it will address any reported vulnerabilities.

ARM and TrustZone are registered trademarks of ARM Limited (or its subsidiaries) in the EU and/or elsewhere. All rights reserved.

Rewards

Nintendo will pay rewards to the first reporter of qualifying vulnerability information ranging from $100 USD to $20,000 USD. Only one reward per qualifying piece of vulnerability information will be awarded. Nintendo will determine at its discretion whether the vulnerability information qualifies for a reward as well as the amount of any such reward. Nintendo does not disclose how the reward amount is calculated. Vulnerability information that is already known to Nintendo or the public, for example, does not qualify for a reward. Rewards will not be issued to individuals who are on sanction lists, or who are in countries on sanction lists.

The reward amount depends on the importance of the information and the quality of the report. In general, the importance of the information is higher if the vulnerability is severe, easy-to-exploit, etc.

A report is evaluated to be high quality if you show that the vulnerability is exploitable by providing a proof of concept (functional exploit code is even better). If you don’t yet have a proof of concept, or functional exploit code, we still encourage you to report to us sooner rather than later such that you do not to lose the opportunity to become the first reporter; you can then submit a proof of concept or functional exploit code later (within three (3) weeks of the initial report) and it will be considered to be a part of the report.

The reward will be paid after the reported vulnerability has been fixed by Nintendo, but no later than four (4) months after Nintendo has confirmed the reported vulnerability.

Nintendo will not disclose to the public the amount of any reward distributed by Nintendo.

Disclosure of vulnerability information

Because older system versions can continue to exploit vulnerabilities that have been reported to Nintendo by researchers and subsequently fixed by Nintendo, you agree that you shall not disclose vulnerability information reported to Nintendo to any other third party until granted permission to do so from Nintendo.

Usually, we grant such permission within two to four weeks from the release of the fix that addresses the vulnerability.

Report template

Please include the details requested below when submitting vulnerability information to Nintendo. All such reports should be submitted in English.

  • State the name of the applicable platform (e.g., Nintendo Switch™)

  • State the system version number(s) that the vulnerability applies to

  • Describe all of the steps required to reproduce the issue

  • Describe the details of what the vulnerability is and, if possible, potential ways to fix the vulnerability

  • Describe, if applicable, how individuals might be able to utilize the vulnerability information to impair the applicable system(s) and/or game(s) by showing a proof of concept or functional exploit code. You are allowed to submit a proof of concept or functional exploit code later (within three (3) weeks), after the initial submission of the report.

  • Confirm that the vulnerability is not widely known to the public.

Legal

You agree that you will not violate any law, or disrupt or compromise any data that is not your own in connection with reporting vulnerability information to Nintendo.

Nintendo reserves all rights against any illegal use of the reported vulnerability information.

Nintendo reserves the right to modify the terms of this program at any time.

You have no obligation to provide Nintendo with the abovementioned security and vulnerability information. However, you agree that by submitting such information to Nintendo, even if the information is not eligible for a reward, you grant Nintendo a worldwide, perpetual, irrevocable, non-exclusive, transferable, sublicenseable, fully-paid and royalty-free license under any and all intellectual property rights that you own or control to use, copy, modify, create derivative works based upon and otherwise exploit such information for any purpose.

Nintendo will not grant rewards to people who are/were employed by Nintendo or third parties that are/were engaged in developing code and/or hardware for Nintendo.


This program have been found on Hackerone on 2016-12-06.

FireBounty © 2015-2024

Legal notices | Privacy policy