The JUMO PSIRT is a specialised team that coordinates the process of responding to security incidents in our products and solutions. Our interdisciplinary team is focused on managing incoming reports of potential vulnerabilities and ensuring that they are addressed in a timely manner.
We value and encourage feedback on security vulnerabilities to help us improve the security of our products. The JUMO PSIRT coordinates communication with all relevant internal and external partners to ensure that identified security issues are responded to appropriately. Our goal is to ensure the reliability and confidence in our products while maintaining the integrity and trust of our customers.
Please do not hesitate to contact us if you discover a security vulnerability in our products or services. Your input is critical to our continuous improvement and the security of our solutions.
Reporting security vulnerabilities
With the help of our cooperation partner CERT@VDE, we benefit from a neutral and non-profit platform that supports us in all aspects of cyber security. CERT@VDE offers its partners valuable expertise in dealing with security vulnerabilities in automation industry products quickly, in a structured and professional manner. Through this collaboration, we ensure that our products meet the highest security standards and that our customers are optimally protected.
To report a security vulnerability, please provide us with the following information:
- Article incl. product group number
- Software version
- Your first and last name
- Name of the organisation
- your country
- Email address
- Confirmation of nomination as finder
- Telephone number (optional)
In addition, we need a description of the vulnerability with the following information:
- Configuration of the application or application
- Description of the operating environment
- Impact of the vulnerability
- Detailed description of the vulnerability
Overview of security advisories
Current security advisories for JUMO products and security information can be found on the CERT@VDE website.