Endpoint

7/24/2018
04:15 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Trend Micro Launches Targeted Server-Side Bug Bounty Program

Targeted Incentive Program will pay anywhere from $25,000 to $200,000 to researchers who are first to demonstrate exploitable vulnerabilities.

Trend Micro, the operator of the Zero Day Initiative (ZDI) and Pwn2Own bug bounty programs, wants security researchers to pay more attention to finding bugs in widely used server-side software.

The security vendor Tuesday announced a new "Targeted Incentive Program" through which it is offering monetary rewards of up to $200,000 to researchers who are the first to report critical flaws in specific targeted products within a certain time frame.

The goal is to try and acquire a greater number of critical server flaws across a broader range of products than has been possible with its other programs, says Dustin Childs, communications manager for Trend Micro's ZDI team. "With Pwn2Own, we're able to acquire specific types of bugs through the various categories of the contest. This is great, but the contest is only a couple of days," Childs says.

The Targeted Incentive Program gives researchers more time to look for specific types of bugs in targeted products, he notes. "We're looking to get researchers focused on specific targets with highly impactful bugs," Childs says.

Starting Aug. 1, Trend Micro will offer bounties ranging from $25,000 to $200,000 for bugs reported in a total of six server products. Five of them are open source technologies: Joomla, Drupal, WordPress, NGINX, and Apache HTTP Server, all on Ubuntu Server 18.04 x64. The sixth is Microsoft IIS on Windows Server 2016 x64.

Trend Micro will award $25,000 to the first security researcher who can demonstrate a working exploit against a previously unknown flaw in either Joomla or Drupal on or before Sept. 30. To qualify for the award, the vulnerability will need to be what the vendor describes as a true zero-day flaw affecting the source code of the targeted software. Flaws in Joomla or Drupal plug-ins and add-on components do not qualify.

The exploit itself should modify the standard execution path of the program or process and allow for execution of arbitrary code. The exploit must also defeat whatever mitigations might exist on the targeted platform, such as sandboxing, address space layout randomization (ASLR), and Data Execution Prevention (DEP).

Similarly, the first researcher who submits a fully functioning exploit demonstrating remote code execution against WordPress before Oct. 31 will qualify for $35,000 under Trend Micro's new program.

The security vendor has reserved its highest bounties for bugs in Microsoft's IIS, NGINX, and Apache HTTP Server. The first security researcher to disclose a working exploit against any of these technologies will be eligible for a $200,000 monetary award so long as the disclosures are made within the qualifying period. Trend Micro's deadline for submitting a flaw in NGINX is at the  of end of November; for Apache HTTPS Server flaws, end of December; and for Microsoft IIS, Jan. 31, 2019.

The monetary awards available through the new program are substantially higher than what is generally available through Trend Micro's standard ZDI, Childs says. However, he declined to discuss the specifics on pricing.

Under the Targeted Incentive Program, once the award for a particular target has been claimed, the software will be removed from the target list and replaced with a new one. Researchers will still be able to claim bounties on subsequent submissions, but those bounties will only be available through Trend Micro's standard bug-reporting process.

For the moment, at least, Trend Micro has earmarked more than $1 million on additional targets, some of which will fetch bounties of up to $250,000. The total award amount available under the program could increase in the future.

"We wanted to start this initiative by focusing on some of the most popular open source server-side products used by our customers and community," Childs notes. Future targets will be chosen with this in mind as well, he says.

"We want to guide research to different targets, so having new categories keeps researchers looking at different areas," Childs adds.

Related Content:

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I guess this answers the question: who's watching the watchers?
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20029
PUBLISHED: 2018-12-10
The nxfs.sys driver in the DokanFS library 0.6.0 in NoMachine before 6.4.6 on Windows 10 allows local users to cause a denial of service (BSOD) because uninitialized memory can be read.
CVE-2018-1279
PUBLISHED: 2018-12-10
Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on ...
CVE-2018-15800
PUBLISHED: 2018-12-10
Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage.
CVE-2018-15805
PUBLISHED: 2018-12-10
Accusoft PrizmDoc HTML5 Document Viewer before 13.5 contains an XML external entity (XXE) vulnerability, allowing an attacker to read arbitrary files or cause a denial of service (resource consumption).
CVE-2018-16635
PUBLISHED: 2018-12-10
Blackcat CMS 1.3.2 allows XSS via the willkommen.php?lang=DE page title at backend/pages/modify.php.