Coordinated Vulnerability Disclosure (CVD)

Under the legal vulnerability reporting procedure, the CCB can receive reports of potential vulnerabilities about ICT products or ICT services subject to Belgian law (even when the organisation does not have a CVD policy or bug bounty program). This procedure can also be applied in the context of an existing CVD policy or a reward program. However, if the researcher wants to benefit from legal protection, he must respect certain conditions, including strict limitation to necessary and proportionate actions, absence of fraudulent intent or malice, as well as notification and reporting to the responsible organisation and to the CCB.

FAQ on the legal vulnerability reporting procedure, Coordinated Vulnerability Disclosure (CVD) policies and bug bounty programs

Frequently Asked Questions

 

The purpose of these FAQs is to set out the concepts, objectives, main legal issues and good practices relating to the adoption of Coordinated Vulnerability Disclosure (CVD) policies and the legal vulnerability reporting procedure (see the dedicated page: Vulnerability Reporting to the CCB). In Belgium, any natural or legal person, acting without fraudulent intent or malice, may, even in the absence of a CVD, search for and report potential vulnerabilities in networks and information systems. However, to benefit from legal protection, certain conditions must be strictly met (see below). The author of a vulnerability report must be aware that he or she does not benefit from a general exclusion of liability when searching for or reporting vulnerabilities: he or she must remain proportionate in his or her actions, act with caution and scrupulously comply with all the conditions required.

  • A CVD policy is a set of rules determined in advance by an organisation responsible for information systems, authorising participants (or "ethical hackers") with good intentions to search for potential vulnerabilities in its systems, or to pass on any relevant information on this subject. These rules, which are generally published on a website, establish a legal framework for collaboration between the organisation responsible and the participants in the policy. In particular, they must ensure the confidentiality of the information exchanged and provide a responsible and coordinated framework for any disclosure of discovered vulnerabilities. Thus, the notion of "disclosure" should not be understood as necessarily implying in all the cases a public disclosure of the vulnerability, but rather at least the disclosure from the participant to the responsible organisation.

    While disclosure of the vulnerability by the participant to the responsible organisation is mandatory, public disclosure of the vulnerability (by the participant or the organisation concerned) is, on the other hand, optional in the context of a CVD policy. This is because a vulnerability could potentially lead to an unexpected or undesirable event and can be exploited by malicious third parties with a view to violating the integrity, authenticity, confidentiality or availability of a system or causing damage.

    In Belgium, it is also allowed to search and report potential vulnerabilities affecting an ICT product (an item or group of items belonging to a network or information system) or an ICT service (a service consisting wholly or mainly of transmitting, storing, retrieving or processing information using networks and information systems) subject to Belgian law (products, systems or networks located in Belgium), when a organisation does not have a CVD policy. In this context, it is possible for the researcher to request the public disclosure of its findings to the CCB. More information about this can be found on our page Vulnerability Reporting to the CCB.

  • A bug bounty program is a set of rules defined by an organisation to award rewards to participants who identify vulnerabilities in the technologies it uses. This reward can take the form of a sum of money, gifts, or public recognition (ranking among the best participants, publication, conference, etc). It is a form of coordinated vulnerability disclosure policy, in which the participant is rewarded according to the number, importance or quality of the information provided. This form of policy is more attractive to potential participants and often offers better results for organisations. An organisation may also call on a bug bounty platform to provide technical and administrative assistance for the management of its vulnerability discovery reward program (coordinator role).

    To reward the participants which use the legal vulnerability reporting procedure, the CCB has put in place a Wall of Fame on its website.

  • A coordinator is a natural or legal person who acts as an intermediary between the participant and the organisation responsible for an information system, by providing logistical, technical, and legal assistance, or other functions, in order to facilitate their collaboration.

    In its role as CVD coordinator in Belgium (even outside the legal vulnerability reporting procedure), the Centre for Cybersecurity Belgium (CCB) acts as a trusted intermediary by facilitating, where necessary, interactions between the natural or legal person reporting a potential vulnerability and the manufacturer or supplier of the potentially vulnerable ICT products or ICT services, at the request of either party. Researchers may reach out to the CCB via the email address indicated on the page Vulnerability Reporting to the CCB.

  • A CVD participant, researcher or “ethical hacker” is a well-intentioned person who wishes to contribute, with the authorisation of the responsible organisation, to improving the security of information systems. They may, for example, carry out penetration tests or use other methods to verify the security of information systems. They are the opposite of cybercriminals, who use their skills to attempt to gain unauthorised access to a system with malicious intent. The participant, for his part, intends to warn the person in charge of the information system, or a coordinator, of any vulnerabilities discovered in order to eliminate them.

  • A CVD policy can provide the responsible organisation with information about vulnerabilities in its systems in a fair and lawful manner, enabling it to take appropriate and timely action. This enables it to effectively prevent or limit, as far as possible, the risks and potential damage that these vulnerabilities could cause. In addition to other technical and organisational measures, the implementation of a CVD policy is an appropriate technical and organisational measure to prevent incidents that could compromise the security of its networks and information systems (and its personal data). It has the undeniable advantage of identifying vulnerabilities and remedying them before a security incident occurs.

    Of course, the attractiveness and effectiveness of the policy are increased when the responsible organisation decides to reward participants according to the importance and quality of the information provided as part of a bug bounty program. Even when the organisation grants rewards and uses an external coordinator (ethical hacking platform), the costs associated with implementing a CVD policy are generally better controlled (and lower) than those usually associated with having audits carried out by external companies. Indeed, the granting of a reward in the context of a bug bounty program results from an obligation of result on the part of the participant, whereas the external auditor is generally only bound by an obligation of means. The latter should therefore be remunerated for all their services, even if they find no vulnerabilities or only minor ones as a result of their research. International technical standards in the field of IT security explicitly recommend the implementation of a CVD policy (see, for example, international standards ISO/IEC 29147 and 30111).

    Adopting a CVD policy also encourages knowledge and research in the field of cybersecurity. This approach implies a commitment by the concerned organisation to process the information provided by participants and to try to remedy the vulnerabilities identified, or at the very least to inform users of the risks involved. This commitment can also constitute a marketing argument and be highlighted in the organisation's communications. Confidence in information systems is undoubtedly an important factor for users and consumers. A CVD policy makes it possible to establish a legal framework between ethical hackers and the organisation, which reinforces the confidentiality of information, provides the best possible framework for any public disclosure, and avoids any possible damage to the organisation's reputation.

    Finally, the implementation of a CVD policy makes it possible to prove the organisation's efforts to comply with its legal obligations to secure its networks and information systems, notably under the EU General Data Protection Regulation ("GDPR"), the Law of 26 April 2024 establishing a framework for the cybersecurity of networks and information systems of general interest for public security (here after "NIS2 Law"), rules of civil liability, the Code of Economic Law, etc. (see Guide to coordinated vulnerability disclosure policies. Part I: Good practices).

    Essential and important entities under the NIS2 Law are even required to adopt their own CVD policy which covers their networks and information systems (art. 30, § 3, 11°).

  • A participant in a CVD policy (or bug bounty program) should comply with the scope and conditions of the policy of the organisation responsible for the concerned ICT products or services.

    Alternatively, or combined with the CVD policy, a researcher can always make use of the legal vulnerability reporting procedure. In this situation, the participant should then respect all the conditions described on the page Vulnerability reporting to the CCB.

    Outside of these situations, a researcher does not benefit from legal protection and could potentially be held accountable for his or her vulnerability research activities.

  • Access to the profession of CVD participant or "ethical hacker" is not regulated. Anyone can therefore declare themselves as "ethical hacker". However, ethical hackers can demonstrate their skills through diplomas, training, professional experience or by passing tests with the responsible organisation (or a coordinator managing a bug bounty platform, for example). There are also recognised training courses in this area (see in particular the "Certified Ethical Hacker - (CEH)" certification organised by the International Council of Electronic Commerce Consultants (EC-Council) and recognised by the American National Standards Institute (ANSI)).

    The best ethical hackers that interact with the CCB are put forward on our Wall of Fame.

  • When there is no CVD policy or bug bounty/reward program for the discovery of vulnerabilities, the ethical hacker can use the legal vulnerability reporting procedure, which is described on our website Vulnerability reporting to the CCB.

  • The purpose of participating in a CVD policy is not to intentionally process personal data, but it is possible that the participant may come into contact with personal data, even incidentally, as part of its vulnerability research. The processing of personal data is broad in scope and includes in particular the storage, modification, retrieval, consultation, use or disclosure of any information that could relate to an identified or identifiable natural person.

    Whether a person is "identifiable" does not depend on whether the data controller simply wishes to identify the person, but on whether it is possible to identify the person, directly or indirectly, using the data (for example: an e-mail address, identification number, online identifier, IP address or location data).

    The controller is the natural or legal person, public authority, department or other body which, alone or jointly with others, determines the purposes and means of the processing.

    Since the CVD policy constitutes a form of contract binding the ethical hacker to the responsible organisation, it is useful to specify the obligations of the parties with regard to the processing of personal data, in particular the purposes and essential means of any processing carried out under this policy (see our Guide - Part I: Good practice, and Part II: Legal aspects).

    In the context of the legal procedure, the Website of the CCB describes what needs to be known about the processing of personal data.

  • To notify a vulnerability to the CCB, an ethical hacker has to follow the procedure described on the page Vulnerability reporting to the CCB.

    This entails that he completes, first, a simplified notification form within 24h of the discovery of a potential vulnerability with some preliminary information about the vulnerability, and then afterwards a full notification form within 72h of the discovery of a potential vulnerability, which provides more details about the findings. These forms are, if possible, encrypted, and then sent to the CCB via the email address specified on the website linked above.

  • The CCB may notably take into account the following elements when considering whether or not to allow the public disclosure of a vulnerability (non-exhaustive list):

    • the severity of the vulnerability and the extent to which it can be exploited;
    • the criticality of the organisations affected by the vulnerability (e.g. essential or important entities in the context of NIS2);
    • the extent to which the vulnerability can be detected and the likelihood of it being exploited by others;
    • the implementation of a solution on the affected information systems;
    • whether or not the vulnerability can be validated.
  • If an organisation is informed of a vulnerability by the CCB, it must assess whether said vulnerability may not be considered as a personal data breach which must be reported to the competent data protection authority under the GDPR.

    In the event of a potential personal data breach that could pose a risk to the rights and freedoms of the individual persons, the CCB would like to remind all concerned organisations that it is the responsibility of the data controller to inform the Data Protection Authority (APD) as soon as possible and no later than 72 hours after becoming aware of it (see the explanations and the procedure required on the DPA website).