We address cyber security vulnerabilities and incidents in order to support the security and safety of our installed solutions, protecting our customers and the environment.

GEESYS Supplier Cyber Security

GEESYS takes cyber security extremely seriously – for the security of our products, systems, services, as well as our customer’s and GEESYS’s data. Our suppliers play a crucial role in our cyber-security program. We therefore expect our suppliers to support and complement GEESYS’s efforts to keep our systems safe. The GEESYS Cyber Security Requirements for Suppliers establish the minimum measures that we expect our suppliers to comply with.

Learn More

Cyber Security requirements for suppliers

Guideline for the GEESYS cyber security for...

Report a Vulnerability

Customers

Please direct your submission to Technical Support and include the following information:

  • Product Line
  • Vulnerable Version
  • Vulnerable Type
  • Organization name
  • Email
  • Phone Number
  • Country

-> Contact Technical Support

Evaluation

GEESYS will analyze the reported potential vulnerability. The CPCERT will communicate to the reporting entity our conclusion and/or a request for more information. Reporting entities must respond within 30 days or the case will be closed. If GEESYS determines that a reported vulnerability is valid, GEESYS will then assess the risk to customers, products affected, field population, and severity of the vulnerability. Note: The time required for handling, including Mitigation and Disclosure, may be impacted by the relative criticality of the vulnerability.

Must include the following information in an encrypted report

  • Product name, model, and firmware version. Include product reference ID and/or part number if available
  • Any special configuration required to reproduce the issue
  • Step-by-step instructions to reproduce the issue
  • Proof-of-concept or exploit code Impact of the issue, including how an attacker could exploit the issue
  • Any other relevant information

Mitigation

GEESYS determines the root cause of the vulnerability and develops a resolution or determines mitigation measures. During this phase, the CPCERT maintains active and secure communications with the reporting entity regarding any mitigations, potentially including advisories, patches, or updates.

Disclosure

Once a mitigation is available, GEESYS will prepare and release a security notification. General security notifications are published on the GEESYS corporate website on the second Tuesday of each month, unless the notification is limited to a specific group of customers, in which case customers may be contacted directly to support remediation. During the disclosure phase, GEESYS assigns a Common Vulnerabilities and Exposures or CVE number (GEESYS is a CVE Numbering Authority in association with MITRE). With the consent of the reporting entity, GEESYS will acknowledge the researcher for their discovery in our security notification.

Reporting entities are required to adhere to this policy in order to provide our customers the time they need to protect their installations and operations through defined mitigation strategies. GEESYS reserves the right to withhold acknowledgment at its sole discretion in the event of an uncoordinated disclosure or if a reporting entity fails to support GEESYS or adhere to this policy. For reports regarding products that are no longer supported, GEESYS will evaluate CVE assignment and discovery acknowledgment on a case-by-case basis.

Each security notification will also contain:

  • Overall description of the vulnerability including CVSS score, impact of the vulnerability if exploited, and CVE (if applicable)
  • Identification of products and versions affected.
  • Patches or mitigating actions to reduce the risk of exploit, including patch download instructions where applicable. GEESYS always encourages customers to take advantage of these updates and/or instructions and patch their installations appropriately.