To safeguard Stanford's electronic systems, networks, and data, the Stanford Security and Privacy offices have established a Vulnerability Disclosure Program, which encompasses clear policies and guidance for individuals who help identify, investigate, and resolve suspected or confirmed security vulnerabilities.
The Vulnerability Disclosure Program policy acknowledges and provides certain protections, within defined limitations, to Stanford faculty, staff, students, and others who report suspected security vulnerabilities encountered during their normal use of our systems and networks to the Stanford Information Security Office (ISO). Additionally, the Vulnerability Disclosure Program outlines the procedures for the appropriate discovery, reporting, investigation, and resolution of security vulnerabilities.
Stanford appreciates the cooperation and collaboration of security researchers in maintaining the security of its systems. Through responsible discovery and disclosure of system vulnerabilities, we can collectively ensure the integrity of our infrastructure.
If a security vulnerability has been identified within a Stanford system or network, we ask the individual identifying the security vulnerability to immediately disclose relevant details to the Stanford Information Security Office. The Vulnerability Disclosure Program is not an invitation to scan Stanford's network or systems for vulnerabilities since we monitor our network ourselves.
Disclosing or discussing a security vulnerability with anyone other than the Stanford Information Security Office can put Stanford systems, networks, data, and the Stanford community at risk. To ensure appropriate response and handling of security vulnerabilities, all reports or information regarding vulnerabilities should be immediately reported as follows:
To report security vulnerabilities within Stanford University systems or networks:
Submit a Help request.
If you are unable to submit a ticket for any reason, contact the Stanford Information Security Office via email at vulnerability-disclosure@lists.stanford.edu. Include as much information as possible in your report, including a way for the system owner to reproduce the security vulnerability, if available.
Any person who wishes to scan for or find security vulnerabilities within a Stanford system or network must first obtain written permission from the system and network owners. Advance notification gives system and network owners an opportunity to either deny permission or prepare for any unintended consequences of the security testing or investigation (e.g., unexpected load or non-routine calls being made to the system). Prior to attempting to actively scan for security vulnerabilities within any Stanford system or network, carefully follow the necessary protocols:
Please do not make any findings (or related research or other documentation) public or share them with anyone until Stanford has had a chance to investigate and remediate the reported issues. Any identified security vulnerability may not be publicly disclosed before 180 days have elapsed from the time that the vulnerability was reported to Stanford University or until prior permission is received from Stanford University.