We take every care to ensure that ASUS products are secure in order to protect the information security privacy of our valued customers. We constantly strive to improve our safeguards for security and personal information in accordance with all applicable laws and regulations, and we welcome all reports from our customers about product-related security or privacy issues. ASUS strives to adhere to the principles of Coordinated Vulnerability Disclosure (CVD) and actively collaborates with partners to address potential vulnerabilities. Any information you supply to ASUS will only be used to help resolve the security vulnerabilities or issues you have reported. This process may include contacting you for further relevant information. Once the vulnerability report is confirmed, ASUS will notify the submitter as soon as possible and provide timely updates on the handling status.
ASUS places a high priority on the security of its products and services. We understand that security is not a one-time effort, but a continuous commitment. Therefore, ASUS continues to work closely with industry partners, academic researchers, and cybersecurity experts, adhering to the best practices outlined in ISO 29147:2018 and ISO 30111:2019 for vulnerability management and handling, while also seeking new ways to enhance the security of our products. As a partner in the CVE Numbering Authority (CNA) program, ASUS follows Coordinated Vulnerability Disclosure (CVD) best practices to ensure timely and responsible resolution of any reported security issues. Additionally, as a member of the Forum of Incident Response and Security Teams (FIRST), ASUS adheres to the PSIRT Framework to systematically address potential security issues reported to ASUS. We encourage customers to take critical security measures, such as following best security practices, keeping products updated, and applying the latest firmware and software patches to ensure that ASUS products always provide a secure and reliable experience.
ASUS appreciates all contributions from customers and the wider ASUS community that help to improve the security of our products and services. However, we kindly request that you act responsibly and bear in mind the following when investigating or reporting any issues:
We always prioritize security and encourage researchers to submit all potential security issues. Each report will be carefully reviewed. However, the following vulnerabilities (including but not limited to) have a very low impact on the system or user security. ASUS will handle and respond to submissions at its discretion based on the circumstances.
We welcome all reports related to security incidents concerning ASUS. We invite you to contact us about such matters through our dedicated web form: https://www.asus.com/securityadvisory. By submitting a vulnerability report, you acknowledge and accept ASUS's vulnerability submission policy.
To help us address your concerns quickly, please ensure you provide the following information on the website.
We encourage you to use encrypted communication to protect the confidentiality of your information. You can encrypt your report using the PGP public key provided below:
Valid until: 2026/12/31
Fingerprint: C8B21E285434E2AEF0EB379596CE3D754D52D350
-----BEGIN PGP PUBLIC KEY BLOCK-----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=YwpG
-----END PGP PUBLIC KEY BLOCK-----
Once we have resolved the reported issue(s), we will provide a suitable solution to all affected customers. We will treat this with the utmost priority and make the solution available as soon as it practical to do so.
ASUS will also maintain a list of the latest software updates, along with descriptions of the issues that have been fixed. Although we will notify customers wherever possible, we also recommend that customers visit this page regularly to make sure they are aware of the latest updates.
All aspects of the ASUS PSIRT (Product Security Incident Response Team) processes and policies may be adjusted based on specific circumstances and are subject to change without prior notice. We do not guarantee a response to any particular issue or category of issues. The use of the information in this document or any related links is at your own risk.
If you have any questions, concerns, feedback, or complaints regarding our Privacy Policy, or if you believe that ASUS has not complied with it, please do not hesitate contact us through 📧 privacy@asus.com.