• Contact Us
  • Select a Location
    Close Location Selection

    Current Location:

    Let us know the location you'd like to browse.

    Select a Location
    OR

Cox Security: Responsible Disclosure Policy

Responsible Disclosure Philosophy

Cox is committed to the security and privacy of its customers, products, and services.  We believe responsible disclosure of any security vulnerabilities identified by security researchers is an essential part of that commitment.  Responsible disclosure requires mutual trust, respect, and transparency between all members of the security community.  Together, we can achieve our common goal.

Security Researchers

Cox accepts vulnerability reports from all sources such as independent security researchers, industry partners, vendors, customers and consultants. Cox defines a security vulnerability as an unintended weakness or exposure that could be used to compromise the integrity, availability or confidentiality of our products, services, or customer information.

Our Compact with Researchers

  • Trust: We maintain trust and confidentiality in our professional exchanges with security researchers.  We ask that you communicate about potential vulnerabilities responsibly, providing sufficient time and information for our team to validate and address potential issues.

 

  • Respect: We respect the skills of researchers and recognize your contribution for keeping our customers safe and secure.  During security testing, we ask that you make every effort to avoid privacy violations, degradation of our user experience, disruption of our production systems, and destruction of data.

 

  • Transparency: We will work with you to validate and remediate reported vulnerabilities in accordance with our commitment to security and privacy.  We request that you provide the technical detail and background necessary for our team to validate reported issues.

 

  • Common Good: We investigate and remediate issues in a manner consistent with protecting the safety and security of those potentially affected by a reported vulnerability.  We ask that you join us in protecting privacy and security by refraining from public disclosure until our team has had time to investigate your findings.

How to Report a Suspected Vulnerability

Cox asks that security researchers share the details of any suspected vulnerabilities with Cox web properties or Cox-provided customer equipment via encrypted email to securebug@cox.com, using the public key provided at the bottom of this page.  The Cox Security team will acknowledge receipt of each vulnerability report within 2 business days, conduct a thorough investigation, and then take appropriate action.  At a minimum, please include the following information with your initial submission:

 

  • Vulnerability classification (Critical/High/Medium/Low)

  • Short description

  • Steps to reproduce (please be as detailed as possible; include screenshots if applicable)

  • Asset/URL

  • Account name (if applicable)

  • Date and time of your testing

  • Preferred contact method (e.g. phone, email)

Thank you

Cox values the research community. Contributions from researchers like you can help protect the privacy and security of our customers! Cox does not offer a bounty program or provide compensation in exchange for security vulnerability submissions.