May 18, 2015 By Jaikumar Vijayan 2 min read

United Airlines has become the first company in the airline industry — and one of the few non-software vendors — to launch a bug disclosure bounty program for third-party security researchers who flag vulnerabilities in its software.

Under the program, United will offer free miles to researchers who report bugs in the company’s websites, customer-facing applications and online portals. The rewards range from 50,000 miles to 1 million miles, depending on the severity of the disclosed bug.

Elite Group

The announcement puts United among a handful of non-technology vendors that have launched bug bounty programs to try to identify problems in their software. A list maintained by vulnerability assessment firm Bugcrowd shows that more than 300 organizations currently offer reward programs for responsible software vulnerability disclosures. Almost all of them are software vendors or Web companies.

Bug disclosure programs give security researchers an incentive to find and report bugs in software platforms in a responsible manner. They also offer organizations a way to identify vulnerabilities in their systems that might otherwise have been overlooked.

Surprisingly Effective

Reward programs have proven surprisingly effective for software vendors, and there’s no reason why United shouldn’t benefit from it, as well, said Contrast Security CTO Jeff Williams to SecurityWeek. Restricting the program to only Web-facing applications to start will give United Airlines an opportunity to learn how to handle flaw disclosure reports, he said.

United announced that its vulnerability disclosure program will reward security researchers who find authentication bypass flaws or bugs in the company’s official websites. Disclosures involving third-party programs and common issues such as cross-site request forgery, cross-site scripting, remote code execution and timing attacks are also eligible for rewards.

Disclosures involving remote code execution flaws qualify for a reward of 1 million miles. Medium risks like authentication bypass and timing attacks are eligible for 250,000 miles, while low-security flaws like cross-site scripting will get 50,000.

Program Caveats

In a bid to discourage security researchers from running penetration tests on in-flight systems and equipment, United has explicitly banned certain categories of flaws from its bug disclosure program. For example, security researchers who look for and report bugs in United’s onboard Wi-Fi, entertainment systems and avionics equipment will not be rewarded for the effort.

Poking around such equipment could actually get researchers into trouble. Anyone who executes brute-force attacks against its systems, performs code injection in live systems or launches denial-of-service attacks on any of the United systems could face criminal prosecution, the company warned when launching the program. Penetration tests that compromise the airline’s MileagePlus frequent flier program and any automated scans on the company’s networks could incur a similar consequence, United warned.

Recent Controversy

United’s decision to launch its bug bounty program follows a recent controversy where it banned a security researcher from one of its flights for certain tweets he made about his ability to manipulate airline equipment and aircraft systems, USA TODAY reported. It’s unclear if the incident prompted United to launch the program or if this was something the airline has had in the works for some time.

The challenge for United will be to find a way to manage the program. While bug bounty programs can be beneficial, they can be costly to manage, Williams said. Organizations of United’s size can often have hundreds or even thousands of applications, and handling bug disclosure across them can be difficult. Often, reported flaws may not actually be vulnerabilities, but United will need to follow through and verify each report all the same to make sure there’s no risk.

More from

Skills shortage directly tied to financial loss in data breaches

2 min read - The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM's 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year.And that's expensive. This skills deficit adds an average of $1.76 million in additional breach costs.The shortage spans both technical cybersecurity skills and adjacent competencies. Cloud security, threat intelligence analysis and incident response capabilities are in high demand. Equally…

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today