23 October 2020, Shenzhen, China - ZTE Corporation (0763.HK / 000063.SZ), a major international provider of telecommunications, enterprise and consumer technology solutions for the Mobile Internet, today has launched new Bug Bounty Programs to encourage security researchers and organizations worldwide to identify vulnerabilities in ZTE's products and services.
ZTE Bug Bounty Programs cover four aspects, specifically, the web application system including core applications and general applications, the wireline, the wireless, as well as the terminal such as mobile internet products.
The wireline refers to fixed network optical access products, fixed network multi-service access networks (MSAN), fixed network terminals, and multi-media products while the wireless includes cloud core networks and wireless networks.
In case that there is a potential security vulnerability with ZTE's product or service as listed above, researchers or organizations can submit a report via email to ZTE PSIRT (Product Security Incident Response Team) at email@example.com.
If the submitted vulnerability report meets the awarding criteria specified in the bug bounty programs, the reporter may receive a bounty award in accordance with the program terms.
As an advocate for transparency and openness, ZTE has been committed to continuously improving the security of products and services, so as to provide users with a secure and reliable service experience.
For further details, please check the following link:
ZTE is a provider of advanced telecommunications systems, mobile devices and enterprise technology solutions to consumers, operators, companies and public sector customers. The company has been committed to providing customers with integrated end-to-end innovations to deliver excellence and value as the telecommunications and information technology sectors converge. Listed in the stock exchanges of Hong Kong and Shenzhen (H share stock code: 0763.HK / A share stock code: 000063.SZ), ZTE sells its products and services in more than 160 countries.