This policy outlines how the Zero Day Initiative (ZDI) handles responsible vulnerability disclosure to product vendors,
Trend Micro customers, security vendors and the general public. ZDI will responsibly and promptly notify the appropriate
product vendor of a security flaw with their product(s) or service(s). The first attempt at contact will be through any
appropriate contacts or formal mechanisms listed on the vendor Web site, or by sending an e-mail to security@, support@,
info@, and email@example.com with the pertinent information about the vulnerability. Simultaneous to the vendor
notification, protection filters may be distributed to Trend Micro customers through approved channels.
If a vendor fails to acknowledge ZDI initial notification within five business days, ZDI will attempt a second
formal contact by a direct telephone call to a representative for that vendor. If a vendor fails to respond after an
additional five business days following the second notification, ZDI may rely on an intermediary to try to establish
contact with the vendor. If ZDI exhausts all reasonable means in order to contact a vendor, then ZDI may issue a public
advisory disclosing its findings fifteen business days after the initial contact.
If a vendor response is received within the timeframe outlined above, ZDI will allow the vendor 4-months (120 days)
to address the vulnerability with a security patch or other corrective measure as appropriate. At the end of the
deadline, if a vendor is not responsive or unable to provide a reasonable statement as to why the vulnerability is not
fixed, the ZDI will publish a limited advisory including mitigation in an effort to enable the defensive community to
protect the user. We believe that by taking these actions, the vendor will understand the responsibility they have to
their customers and will react appropriately. Extensions to the 120-day disclosure timeline will not be granted.
If a product vendor is unable to, or chooses not to, patch a particular security flaw, ZDI will offer to work with
that vendor to publicly disclose the flaw with some effective workarounds. In no cases will an acquired vulnerability be
“kept quiet” because a product vendor does not wish to address it. To maintain transparency into our process, we plan on
publishing a summary of the communication we've had with the vendor regarding the issue. We hope that this level of
insight into our process will allow the community to better understand some of the difficulties vendors have when
remediating high-impact bugs. ZDI will make every effort to work with vendors to ensure they understand the technical
details and severity of a reported security flaw.
ZDI will formally and publicly release its security advisories on our Web site. Only advisories listed on the
website should be considered official ZDI advisories.