Security Issue Reporting Guidelines

Steps to report a vulnerability.

Please report any potential or real security vulnerability claim to the Traka Security Resources Team via e-mail at 
product-security@traka.com

Please encrypt your e-mail with PGP and this public key

Please include the information below in your e-mail report:

  • First and last name
  • Company name
  • Contact phone number (optional)
  • Preferred e-mail contact
  • General description of vulnerability
  • Product containing vulnerability (hardware & software versions), part numbers
  • Tools, hardware and other configurations required to trigger the event
  • Any security or service pack updates applied
  • Document instructions to reproduce the event
  • Sample code, proof of concept or executable used to produce event
  • Definition of how the vulnerability will impact a user including how the attacker could breach security on-site
  • Affected product
  • System details (develop for range of ASSA ABLOY Global Solutions Hospitality products)
  • Technical description and steps to reproduce
  • PoC (link)
  • Other parties and products involved
  • Disclosure plans/dates/drivers
  • What was the purpose and scope of research being performed when found (context)?

Select topic

  • Reporting Guidelines

    Please report any potential or real security vulnerability claim to the Traka Product Security Team via e-mail. 

  • Disclosure Policy

    Traka values insight from the security research community and welcomes disclosure and collaboration with this community.

  • Product Security Advisories

    Documentation related to Traka Product Security Advisories.