Proton
Illustration of vulnerability disclosure

Our mission at Proton(neues Fenster) is to make online safety accessible to everyone. Millions of people depend on our Proton Mail(neues Fenster) to secure their communications and keep their information private.

In order to make this high level of security accessible to all Internet users, we must work to integrate Proton Mail seamlessly with third-party products, from web browsers to mobile devices. Occasionally we find security flaws in these products that can be exploited by attackers, putting at risk the privacy and security of Proton Mail users. As any technology can contain bugs, it is the responsibility of the developer community to work together cooperatively to discover, responsibly report, and patch vulnerabilities in a timely manner.

This document describes our policies for vulnerability disclosure when we find flaws in other products and services. When developers find vulnerabilities in our products, we have an established process for reporting these: You can learn more by visiting our Proton Mail Bug Bounty program(neues Fenster) and Proton VPN Bug Bounty program(neues Fenster).

What we do when we discover a vulnerability

When we find a bug in a third-party product, we reach out directly to the vendor and describe the issue in detail. We follow the vendor’s vulnerability disclosure process whenever possible. 

Along with our bug report, we notify the vendor that we follow the industry standard of 90 days for publicly disclosing vulnerabilities to the security community. If the vendor has made a good faith effort to resolve the issue and has indicated its intent to release a patch soon, we may extend this deadline by 14 days. However, if the vulnerability is actively exploited (0-day) we may reduce the public disclosure grace period to seven days to protect users.

Oftentimes, if we understand the problem well, we may propose bug fixes or work with the product’s developers to resolve the issue. Our primary goal is to make the Internet safer, so we’re happy to collaborate toward a solution.

Summary

When Proton Mail discovers a new vulnerability in a third-party product:

  1. We inform the affected vendor, and all information is kept confidential for 90 days. 
  2. We publicly disclose the information after 90 days if we have not received feedback.
  3. If the vendor requests an extension, we publicly disclose the information after 104 days.

How to reach our security team

If you want to get in touch with us regarding a vulnerability affecting our services or products, please send a message to [email protected]. (You may also use the PGP key for this address, which can be found at the bottom of our Security Details page(neues Fenster).) We will reply to you within one business day.

Best Regards,
The Proton Mail Security Team

Verwandte Artikel

The cover image for a Proton Pass blog comparing SAML and OAuth as protocols for business protection
en
SAML and OAuth help your workers access your network securely, but what's the difference? Here's what you need to know.
Proton Lifetime Fundraiser 7th edition
en
Learn how to join our 2024 Lifetime Account Charity Fundraiser, your chance to win our most exclusive plan and fight for a better internet.
The cover image for a Proton Pass blog about zero trust security showing a dial marked 'zero trust' turned all the way to the right
en
Cybersecurity for businesses is harder than ever: find out how zero trust security can prevent data breaches within your business.
How to protect your inbox from an email extractor
en
  • Privatsphäre-Richtlinien
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
en
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
The cover image for Proton blog about cyberthreats businesses will face in 2025, showing a webpage, a mask, and an error message hanging on a fishing hook
en
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here are the top cybersecurity threats we expect companies to face in 2025—and how Proton Pass can protect your business.