Banner object (1)

Hack and Take the Cash !

794 bounties in database
  Back Link to program      
Xfinity Home logo
Hall of Fame


Xfinity Home

Program Overview

At Comcast, we’re committed to working alongside the security research community, and know we’re at our best when we continually enhance this process. That's why we’ve formally launched Xfinity Home’s bug bounty program, as a way to reward contributions from security researchers who help make Xfinity Home more secure.

Xfinity Home is a complete home security system, with 24/7 professional monitoring, and battery/cellular backup. Our customers enjoy peace of mind through live video monitoring with our Xfinity cameras, and motion activated recording that detects people, vehicles, and pets. The door/window sensors allow you to monitor your home and receive real-time alerts when doors are open or closed.

Please note, this program is specifically scoped for Xfinity Home. If you believe you've found a security issue related to any other product or service please report through our vulnerability disclosure program.


For the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy. However, in some cases, a vulnerability priority will be modified due to its attack complexity, requirements, likelihood, or impact of successful exploitation.

All submissions are reviewed to determine an accurate priority and any change will result in a detailed explanation provided to the researcher with the opportunity for a follow up.

Reward Guidelines:

Rewards are determined through an internal impact assessment, researcher interaction and the overall quality, content, and accuracy of the report.

High impact findings:

Comcast may reward eligible P1 submissions up to $10,000 for findings related to:

  1. Remote unauthorized access (via publicly accessible internet, not on the same LAN/wireless network) of:

    • Cloud storage videos
    • Live camera feeds
    • Bypassing Armed Systems
  2. Abuse/Theft of Service

Reward Range

Last updated 18 Jul 2019 14:03:49 UTC

Technical severity | Reward range
p1 Critical | $1,500 - $3,500
p2 Severe | $750 - $1,200
p3 Moderate | Up to: $300
p4 Low | Up to: $150

P5 submissions do not receive any rewards for this program.


In scope

Target name | Type
Xfinity Home Starter Kit (see below) | Hardware (see below) | Website
Xfinity Home iOS mobile app | iOS
Xfinity Home Android mobile app | Android
Xfinity Home cameras | IoT

Out of scope

Target name | Type
3rd Party Devices (known as Works with Xfinity) | IoT | Website

Target Info:

All submissions must have demonstrable impact on the Xfinity Home product. To be able to test comprehensively, researchers must be a current Xfinity Home subscriber. Without an active Xfinity account, the available attack surface is highly limited - however, we encourage researchers to test with what is available to them.


All Comcast/Xfinity endpoints called by Xfinity Home applications are in- scope.

Xfinity Home Web/Mobile | Description
---|--- | API Gateway
xhomeapi- | API for fetching device information | Endpoints for CVR data
* | Endpoint for live video | User Authentication | API for retrieving user information
Touchscreen Controller
Windows/Door Sensors
Wireless keypad
Wireless motion sensors
Xfinity Home Cameras


Any domain/property of Comcast not listed in the targets section is out of scope for this bounty program. This includes any/all subdomains not listed above. If you believe you've identified a Comcast vulnerability on a system outside the scope of this program, please report it through our vulnerability reporting page.

  • Email spoofing issues (e.g., SPF, DKIM, DMARC)
  • Automated scan reports without valid proof of concept
  • Physical tampering of the device (I/O devices such as USB, SIM, and SD card slots are in scope)
  • 3rd party integration
  • Reports requiring a rooted/jailbroken device
  • Duplicate/known submissions
  • Load Testing (DoS, DDoS, wireless jamming, etc.)
  • Social engineering attacks
  • Theoretical security issues
  • Protocol-specific flaws


Researchers must have explicit permission from the account owner to perform any form of security testing.

Researchers may not be a current or former employee, contractor or immediate family member.

Note: This program adheres to Bugcrowd's coordinated disclosure terms. We ask that you provide us a copy of your disclosure report prior to publication and do not publicly report findings until they been fully remediated.

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.

In Scope

Scope Type Scope Name

Xfinity Home Android mobile app


Xfinity Home Starter Kit (see below)


Xfinity Home iOS mobile app


Xfinity Home cameras

web_application (see below)

Out of Scope

Scope Type Scope Name

3rd Party Devices (known as Works with Xfinity)


This program leverage 7 scopes, in 5 scopes categories.

FireBounty © 2015-2020

Legal notices