May 18, 2015 By Jaikumar Vijayan 2 min read

United Airlines has become the first company in the airline industry — and one of the few non-software vendors — to launch a bug disclosure bounty program for third-party security researchers who flag vulnerabilities in its software.

Under the program, United will offer free miles to researchers who report bugs in the company’s websites, customer-facing applications and online portals. The rewards range from 50,000 miles to 1 million miles, depending on the severity of the disclosed bug.

Elite Group

The announcement puts United among a handful of non-technology vendors that have launched bug bounty programs to try to identify problems in their software. A list maintained by vulnerability assessment firm Bugcrowd shows that more than 300 organizations currently offer reward programs for responsible software vulnerability disclosures. Almost all of them are software vendors or Web companies.

Bug disclosure programs give security researchers an incentive to find and report bugs in software platforms in a responsible manner. They also offer organizations a way to identify vulnerabilities in their systems that might otherwise have been overlooked.

Surprisingly Effective

Reward programs have proven surprisingly effective for software vendors, and there’s no reason why United shouldn’t benefit from it, as well, said Contrast Security CTO Jeff Williams to SecurityWeek. Restricting the program to only Web-facing applications to start will give United Airlines an opportunity to learn how to handle flaw disclosure reports, he said.

United announced that its vulnerability disclosure program will reward security researchers who find authentication bypass flaws or bugs in the company’s official websites. Disclosures involving third-party programs and common issues such as cross-site request forgery, cross-site scripting, remote code execution and timing attacks are also eligible for rewards.

Disclosures involving remote code execution flaws qualify for a reward of 1 million miles. Medium risks like authentication bypass and timing attacks are eligible for 250,000 miles, while low-security flaws like cross-site scripting will get 50,000.

Program Caveats

In a bid to discourage security researchers from running penetration tests on in-flight systems and equipment, United has explicitly banned certain categories of flaws from its bug disclosure program. For example, security researchers who look for and report bugs in United’s onboard Wi-Fi, entertainment systems and avionics equipment will not be rewarded for the effort.

Poking around such equipment could actually get researchers into trouble. Anyone who executes brute-force attacks against its systems, performs code injection in live systems or launches denial-of-service attacks on any of the United systems could face criminal prosecution, the company warned when launching the program. Penetration tests that compromise the airline’s MileagePlus frequent flier program and any automated scans on the company’s networks could incur a similar consequence, United warned.

Recent Controversy

United’s decision to launch its bug bounty program follows a recent controversy where it banned a security researcher from one of its flights for certain tweets he made about his ability to manipulate airline equipment and aircraft systems, USA TODAY reported. It’s unclear if the incident prompted United to launch the program or if this was something the airline has had in the works for some time.

The challenge for United will be to find a way to manage the program. While bug bounty programs can be beneficial, they can be costly to manage, Williams said. Organizations of United’s size can often have hundreds or even thousands of applications, and handling bug disclosure across them can be difficult. Often, reported flaws may not actually be vulnerabilities, but United will need to follow through and verify each report all the same to make sure there’s no risk.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today