DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Companies that want responsible disclosure should reinforce it.

Posted on October 3, 2019 by Dissent

Today’s post is a reminder that if you make claims on your web site that you take privacy and security very seriously and that you respond promptly to responsible disclosures, you really need to suit your actions to your words.

On July 7, Timothy French of Underdog Security contacted LG to report that they had found a MsSQL injection vulnerability in a subdomain on LGE.com. They responsibly notified LG Product Security, including proof of concept and the offer to be available to answer any questions if LG security had any follow-up questions.

LG responded positively and promptly on July 8.

And then…. nothing.  No progress reports, no updates, nothing.

Underdog Security followed up by requesting updates and progress, but by one month later, the vulnerability was still unpatched and the researchers had gotten no substantive update from LG Product Security, despite the statement on LG’s site about promptly investigating reports and keeping vulnerability reporters informed at all steps in the process.

Given that the vulnerability was potentially quite serious (if I understood their analysis correctly), they reached out to DataBreaches.net to see if I could get LG to take the matter more seriously or to provide an update.

On August 6, I sent an email to LG’s media department with a cc: to Product Security.  My inquiry read, in small part:

Frustrated with LG’s failure to uphold its own responsible disclosure processes, the researchers have given their findings to the media. And I am looking at their POC for a vulnerability that they claim could result in an attacker rooting your entire network and/or using the network to spread malware or phish other users.

Does LGPSRT agree with the researchers’ assessment of the critical nature of the reported vulnerability?

LG’s communications department did not respond to my inquiry, but I did receive an auto-response from Product Security:

Period : 2019/08/05 ~ 2019/08/15

LG PSRT is not available for reply during the following period due to business trip. (8/5 ~ 8/15, UTC+09:00)
LG PSRT will reply as soon as possible after returning from business trip.

We apologize for any inconvenience.
Thank you.

Best Regards,
LG PSRT.

I never heard from them again — or LG’s communications department.

Ten days later, Underdog Security sent another email to LG, basically threatening full disclosure if the matter wasn’t addressed promptly after all that time. A few days later, the subdomain was removed. Underdog Security subsequently received a pretty lame explanation and apology for the delay that stated that because the involved subdomain service was not a regular service, it had been difficult to find the person in charge. For more than one month? Seriously, LG?

Commenting on the delay in resolution and whether responsible disclosure is always the route to take, Tim commented:

This vulnerability had the potential to be escalated to code execution, and yet the company took their sweet time addressing the problem. Full disclosure likely would have expedited this process immediately.

So the question you have to ask: is responsible disclosure always the right thing to do? Typically, yes. However, what if something affecting millions is left in the wild unaddressed for any period of a time going past a month, leaving staff and consumers at risk?

That’s a fair question. Recently, I have mentally criticized a number of researchers for rushing to disclosure before leaks are secured or because the researchers are trying to promote themselves or hype their findings with exaggerated headlines. We don’t need more FUD, but we do need community standards for when it is appropriate to go full disclosure if you cannot get a response or action from an entity.

In this case, LG’s web site on security issues asked researchers to disclose responsibly and to keep their findings confidential until they could be addressed. In exchange, LG said they would keep researchers apprised at all steps in the process. They didn’t. Why should any researchers take them seriously in the future? Why should anyone who is not paid to do this continue trying to help a company that keeps ignoring their own promises?

If companies want to encourage responsible disclosure, then they need to reinforce it — if not by bug bounty programs, then by at least acknowledging and responding in a timely fashion, and ideally, by publicly thanking those whitehats who have tried to help them improve their security.

I realize that I have not addressed the actual vulnerability in this matter.  I am not a security professional and am only looking at the behavior and psychology of asking for responsible disclosure and then not holding up your end of an agreement.

You can read Underdog Security’s report on the vulnerability and their attempts to get it addressed in a timely fashion on zero.lol.  You can follow Timothy French on Twitter @leet_sauce and @UDSec_UK.

For more information on responsible disclosures, see GDI Foundation and follow them on Twitter @GDI_FDN,

Category: Commentaries and Analyses

Post navigation

← Daily Dicta: The FTC Should Be Suing Itself for How It Handled This Case
MO: Hacked social media account leads to Jackson school threat →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.