Security
In today's world, security is more critical than ever. At Progress, we prioritize our customers' security, ensuring that our products are built with a strong foundation to safeguard their data and operations. We are committed to identifying and addressing potential vulnerabilities to provide our clients with the highest level of protection and confidence in our products.
Purpose of this Article
This article covers common security-related questions, best practices, and the tools and processes we use to ensure the security of our products. It also outlines how customers and security researchers can report security issues, including our processes to mitigate risks. We provide guidance for submitting security reports through technical support or Bugcrowd, ensuring a clear pathway for identifying and addressing security concerns.
Reporting Security Vulnerabilities
Whether you're a customer encountering an issue or a security researcher, we have processes to ensure a swift response and evaluation. Below are the steps for Progress customers and security researchers to report potential security vulnerabilities:
For Progress Customers
At Progress, we work diligently to identify and fix security vulnerabilities in our products. Customers who believe they have identified a security issue should contact Technical Support for an evaluation. This allows us to document the issue and have our engineering teams confirm and address it as needed. Customers can submit reports through our support center:
For Security Researchers
We value the contributions of security researchers and ethical hackers. If a researcher identifies a potential vulnerability, they can submit it via our Bugcrowd platform. We aim to meet the following response times:
| Type of Response | SLO (in business days) |
|---|---|
| First Response | 7 days |
| Time to Triage | 10 days |
| Time to Resolution | Depends on severity |
For more information, visit:
Vulnerability Remediation Guidelines
Progress follows defined timelines for remediating vulnerabilities based on their severity levels, ensuring a structured and efficient approach to maintaining security across all products. These guidelines are aligned with CVSS (Common Vulnerability Scoring System) scoring:
- Critical scored issues (CVSS 9.0+): Resolved within 30 days.
- High scored issues (CVSS 7.0–8.9): Resolved within 60 days.
- Medium or lower scored issues (CVSS < 7): Resolved within 90–120 days, depending on the score.
While these are not strict SLA (Service Level Agreement), they serve as a commitment to providing timely resolutions for identified vulnerabilities.
What We Do to Mitigate Risk
Our dedicated security team, comprised of experienced developers and security experts—our "Security Champions"