Reporting vulnerabilities
We value the expertise and help of the cyber security community in helping us maintain our high security standards. You can use this site to report any suspected security vulnerabilities related to our services or products.
If you are aware of a vulnerability that could affect Proximus’s services or products, please contact us via the link disclosed under “How to Report a Vulnerability”. Our security specialists will review all submissions and, where required, work with you to make sure we are able to fix any potential issues as quickly as possible.
Rules of engagement
Vulnerability disclosure policy guidelines
In order to improve the performance and security of our networks and information systems, we have adopted a coordinated vulnerability disclosure policy. This policy gives reporters the opportunity to search for potential vulnerabilities in our organisation's systems, equipment and products with good intentions or to pass on any information they discover about a vulnerability.
However, access to our IT systems and equipment is only permitted with the intention of improving security, informing us of existing vulnerabilities and in strict compliance with the other conditions set out in this document.
Our policy concerns security vulnerabilities that could be exploited by third parties or disrupt the proper functioning of our products, services, networks or information systems.
The reporter is also permitted to introduce or attempt to introduce data into our computer system, subject to the purposes and conditions of this policy.
Our organisation undertakes to implement this policy in good faith and not to take legal action, either civil or criminal, against a reporter who complies with its conditions.
The reporter must be free of fraudulent intent, intent to harm, intent to use or intent to cause damage to the visited system or its data. This also applies to third-party systems located in Belgium or abroad.
If there is any doubt about any of the conditions of our policy, the reporter must first ask our contact point and obtain its written approval before acting.
How to report a vulnerability?
Please help us by providing as much information as possible about the problem you have discovered. If you have not yet done so, please remember to review our rules and guidelines previously announced before submitting the information.