To submit a Cybersecurity vulnerability report to Wassenburg Medical’s Product Security Team, please submit the form below with a brief description of your discovery. Wassenburg Medical will send a timely response to the submission (typically within five (5) business days). All reports should be submitted in English.

Independent cybersecurity researchers who discover and submit a vulnerability report to Wassenburg Medical may choose to receive credit after the submission has been accepted and validated by our product security team. Wassenburg Medical reserves the right, in its sole discretion, to determine whether to acknowledge security researchers and reporters.

Reporting Product Cybersecurity Vulnerability

Consent(Required)
*By completing this form you are providing explicit consent to the following: • Wassenburg Medical processing of your name and contact information for the purposes of reporting and investigation of a potential security vulnerability identified as a Wassenburg Medical product. • Please see our Wassenburg Medical Privacy Policy for additional information concerning the processing of your personal information by Wassenburg Medical.
Name or Alias(Required)
Email(Required)
Acknowledgment(Required)
*Would you like to be acknowledged by name in any published document about this vulnerability:
Include Device Name, Model, serial number(s), and software version, if known.
Describe the vulnerability in sufficient detail. Include a proof of concept, if possible.
How and when was it discovered. Include potential impact and potential remediation, if discovered.
Please provide any additional information that may be helpful to the investigation, such as, testing environment, tools used to conduct the testing, specific assumptions and proof-of-concept, ways to produce vulnerable behavior, etc.
Additional Information
In cases where vulnerability is in third party component(s), do you agree that information provided in the “Contact Information” section above can be shared with such third parties?
Regulatory or Public Disclosures(Required)
Have institutions such as: regulatory agencies, vendors, vulnerability coordinators, information sharing organizations, other security researchers, etc. been notified?