Coordinated Vulnerability Disclosure (CVD)

Have you discovered a vulnerability in an IT system or in commercially available applications, software or hardware impacting Switzerland and want to report it? There are different ways to report a vulnerability.

Federal Administration assets

If the vulnerability impacts an IT system, application or hardware of the Federal Administration, you should report the vulnerability to the NCSC using the form below. Please follow our  common vulnerability disclosure policy to ensure compliant reporting.

Non-Federal Administration assets

If you have found a vulnerability in an IT system or product that does not belong to the Federal Administration, but which impacts Switzerland as a country, the vulnerability should always be reported to the owner of the system or the product supplier first.

You should only report your findings to the NCSC If you cannot find a point of contact or if the affected party does not provide an adequate response to the vulnerability.

In this case, the NCSC will serve as an intermediary to bring the vulnerability to the attention of the affected party again and attempt to get the issue resolved.

CVE publication

Important note on CVE requirement:

To ensure a quicker processing of your CVE request, mention if a public reference to the vulnerability exists or if it has been planned by you or the vendor according to MITRE requirements. It should at least:

  • Mention the vulnerability (including the planned or existing CVE ID ) and the versions of the product affected by the vulnerability
  • Be publicly accessible and should not require registration or login

In accordance with the Federal law on information security, the NCSC may publish information relating to vulnerabilities, indicating the software or hardware impacted, this could also be used as a CVE reference under certain conditions (Art. 73c, al 1., al 2.).

To help speed-up the process, please create a CVE draft in the «Vulnogram» , export it as JSON and attach it to your submission.

If the reported vulnerability affects a cloud service, make sure it is eligible under the 7.4.4. Requirements for Assigning a CVE ID . «The vulnerability requires customer or peer action to resolve.».

How to submit a CVD report to us:

  • Complete the form below including details of your discovery. Please include your PGP public key so that the NCSC can ensure timely and secure communication with you.
  • For reports on systems that do not belong to the Federal Administration, confirm that you have tried to get in contact with the affected parties and document the point of contact in the appropriate fields.
  • Mention if your request is related to a CVE publication, in such case attach a draft and let us know if the publication of a reference is all-ready planned (see important note on CVE requirements).
  • Provide as much information as possible for the NCSC to reproduce the vulnerability or at least assess the validity based on the report.
  • The NCSC might need to communicate directly with you during the handling of a case. Please provide at least an email address (you can still communicate with us anonymously).
  • For encrypted communication, use the PGP key of vulnerability [at] ncsc.ch.

PGP NCSC Vulnerability (ASC, 3 kB, 31.08.2021)E-Mail: vulnerability at ncsc.ch
Key ID: 0xBCBB3E225F16898A
Fingerprint: F25A B97C 779A 0C6A 0DE0 F356 BCBB 3E22 5F16 898A

SMIME NCSC Vulnerability (CER, 1 kB, 06.10.2022)E-Mail: vulnerability at ncsc.ch
Fingerprint: bc4563dc1e37b759cd83ffa72a0d4bed468340c2


Report vulnerabilities

*
Brief description of the vulnerability (max. 250 characters).
 
Description severity level see https://www.first.org/cvss/calculator/3.0
*
Describe your observation in as much detail as possible to help us reproduce the problem and fix it as quickly as possible.
 
Describe the impact of the vulnerability. What is affected if the vulnerability is exploited?
 
If available, a mitigation approach can be described here.
 
Please use ASCII-text (for example Markdown), pdf or png files for the documentation.
*
the framework conditions and rules
*
I have tried to get in contact with the affected parties if my request is related to a CVE publication or if my report is not related to a system of the Federal Administration
 
Please document previous attempts to contact the affected parties, who was contacted, when, through which channels, and what their response was.

Personal information (optional)

You can enter your personal information here. This will enable us to contact you if we have further questions.

 
 
 
 
You can attach your PGP public key here. Note: Use the .pgp extension for the PGP key file.
 


https://www.ncsc.admin.ch/content/ncsc/en/home/infos-fuer/infos-it-spezialisten/themen/schwachstelle-melden.html