Nintendo’s goal is to provide a secure environment for our customers so that they can enjoy our games and services. In order to achieve this goal, Nintendo is interested in receiving vulnerability information that researchers may discover regarding Nintendo’s platforms. Currently, in the context of the HackerOne program, Nintendo is only interested in vulnerability information regarding the Nintendo 3DS™ family of systems and is not seeking vulnerability information regarding other Nintendo platforms, network service, or server-related information.
Below are examples of types of activities that Nintendo is focused on preventing:
* Piracy, including:
* Game application dumping
* Copied game application execution
* Cheating, including:
* Game application modification
* Save data modification
* Dissemination of inappropriate content to children
Below are examples of vulnerabilities that Nintendo is interested in receiving information about:
* System vulnerabilities regarding the Nintendo 3DS™ family of systems
* Privilege escalation on ARM11 userland
* ARM11 kernel takeover
* ARM9 userland takeover
* ARM9 kernel takeover
* Vulnerabilities regarding Nintendo-published applications for the Nintendo 3DS™ family of systems
* ARM11 userland takeover
* Hardware vulnerabilities regarding the Nintendo 3DS™ family of systems
* Low-cost cloning
* Security key detection via information leaks
Nintendo reserves the right to choose whether or not it will address any reported vulnerabilities.
Nintendo will pay rewards to the first reporter of qualifying vulnerability information ranging from $100 USD to $20,000 USD. Only one reward per qualifying piece of vulnerability information will be awarded. Nintendo will determine at its discretion whether the vulnerability information qualifies for a reward as well as the amount of any such reward. Nintendo does not disclose how the reward amount is calculated. Vulnerability information that is already known to Nintendo or the public, for example, does not qualify for a reward. Rewards will not be issued to individuals who are on sanction lists, or who are in countries on sanction lists.
The reward amount depends on the importance of the information and the quality of the report. In general, the importance of the information is higher if the vulnerability is severe, easy-to-exploit, etc.
A report is evaluated to be high quality if you show that the vulnerability is exploitable by providing a proof of concept (functional exploit code is even better). If you don’t yet have a proof of concept, or functional exploit code, we still encourage you to report to us sooner rather than later such that you do not to lose the opportunity to become the first reporter; you can then submit a proof of concept or functional exploit code later (within three (3) weeks of the initial report) and it will be considered to be a part of the report.
The reward will be paid after the reported vulnerability has been fixed by Nintendo, but no later than four (4) months after Nintendo has confirmed the reported vulnerability.
Nintendo will not disclose to the public the amount of any reward distributed by Nintendo.
Disclosure of vulnerability information
Because older system versions can continue to exploit vulnerabilities that have been reported to Nintendo by researchers and subsequently fixed by Nintendo, you agree that you shall not disclose vulnerability information reported to Nintendo to any other third party.
Please include the details requested in below when submitting vulnerability information to Nintendo. All such reports should be submitted in English.
- State the name of the applicable platform (e.g., Nintendo 3DS™, New Nintendo 3DS™, or both)
- State the region of the platform you used (e.g., JP, US, or EU)
- State the system version number(s) that the vulnerability applies to
- Describe all of the steps required to reproduce the issue
- Describe the details of what the vulnerability is and, if possible, potential ways to fix the vulnerability
- Describe, if applicable, how individuals might be able to utilize the vulnerability information to impair the applicable system(s) and/or game(s) by showing a proof of concept or functional exploit code. You are allowed to submit a proof of concept or functional exploit code later (within three (3) weeks), after the initial submission of the report.
- Confirm that the vulnerability is not widely known to the public.
You agree that you will not violate any law, or disrupt or compromise any data that is not your own in connection with reporting vulnerability information to Nintendo.
Nintendo reserves the right to modify the terms of this program at any time.
You have no obligation to provide Nintendo with the abovementioned security and vulnerability information. However, you agree that by submitting such information to Nintendo, even if the information is not eligible for a reward, you grant Nintendo a worldwide, perpetual, irrevocable, non-exclusive, transferable, sublicenseable, fully-paid and royalty-free license under any and all intellectual property rights that you own or control to use, copy, modify, create derivative works based upon and otherwise exploit such information for any purpose.
Nintendo will not grant rewards to people who are/were employed by Nintendo or third parties that are/were engaged in developing code and/or hardware for Nintendo.
Hall of Fame