Incident Response

We attach great importance to security issues and welcome all security researchers to report potential security vulnerabilities to us to improve the security of our products and services.

Vulnerability Response and Disclosure Process

Monitor and and assign received vulnerabilities in a timely manner

Verify the vulnerability and confirm the exploitability and impact

Provide effective fix solutions or risk remediations measures

Investigate and confirm the complete scope of affected products

Review and publish the security advisory for the security vulnerability

Report Vulnerabilities

You can report vulnerabilities through Xiaomi Security Center, Hackerone vulnerability platform, or via email. The following are the detailed reporting methods:

Mailbox

security@xiaomi.com

As the vulnerability information is extremely sensitive, we strongly recommend you download and use our public PGP key (key ID DCC2896C; fingerprint: EF25 EADF 40D1 98D1 2029 F0A9 B4A8 E8AA DCC2 896C) to encrypt the information before sending it to us.

The email should include at least the following information:

- Your organization and contact information

- Products and versions affected

- Description of the potential vulnerability

- Information about known exploits

- Disclosure plans

- Additional information, if any

Website

hackerone.com/xiaomi

Xiaomi Security Center

sec.xiaomi.com

Attention

Although we encourage investigation of potential security breaches, we cannot tolerate any activity that may interfere with legitimate users or may violate applicable computer abuse, cyber security and data protection regulations. Therefore, the following activities are prohibited:

- Modification or destruction of data

- Service disruption or degradation, such as DoS

- Disclosure of personal, proprietary or financial information

Response Time

After receiving the vulnerability you reported, we will send you vulnerability response related information within 48 hours based on the platform you used to report the vulnerability, as follows:

1) For vulnerabilities reported through the Xiaomi Security Center or Hackerone platform, we will send you a vulnerability response notice, information confirmation and feedback related to the vulnerability through the platform's internal messaging system. The progress of the vulnerability's solution development will also be continuously updated through the corresponding platform's internal messaging system or email as soon as possible.

2) For vulnerabilities reported via email, we will send you a vulnerability response notice, information confirmation and feedback related to the vulnerability via email. The progress of the vulnerability's solution development will also be continuously updated through email as soon as possible.

* Note: Actual vulnerability response time may vary depending on the risk level and complexity of the vulnerability.

Vulnerability Disclosure Instructions

Xiaomi discloses security vulnerabilities in its products in two ways:

- Security Advisory (SA): When the vulnerability has been confirmed, we will disclose detailed information about the vulnerability and the corresponding fix within 180 days of completing the vulnerability analysis and developing a fix plan through a SA.

- Security Notice (SN): When a potential vulnerability is discovered or noted externally, but we have not confirmed the vulnerability yet, we disclose the basic information of the vulnerability and our investigation progress through an SN.

The vulnerability information shall be kept confidential until Xiaomi releases the Security Advisory or Security Notice to the public.

For the basic principles and dispute resolution during the vulnerability reporting and disclosure, please refer to our Dispute Resolution Principles.

Xiaomi discloses the security vulnerability information in our
Xiaomi Security Center
regularly.

*Note: The actual vulnerability disclosure time may be adjusted based on the disclosure plan of the publisher, the vulnerability solution development plan, the negative impact that the solution may bring, and the vulnerability disclosure plan of other service providers.