Harman International Lifestyle Products & Services
Bounty Range
$100 - $4,000
external program
Bounty Range
$100 - $4,000
external program
BountyHall of fame
$100 Low $300 Medium $1,000 High $2,500 Critical $4,000
Avg reward -
Max reward -
Scopes25
Supported languagesEnglishGermanHindi
Reports179
1st response < 1 day
Reports last 24h-
Reports last week2
Reports this month2
Program description
Program activity
Keeping user information safe and secure is a top priority and a core company value for us at Harman (“We”, “Us” or “Harman”).
We welcome the contribution of external security researchers and look forward to awarding them for their invaluable contribution to the security of all Harman customers.
In addition to the YesWeHack General Terms of Use for “Hunter” and any other applicable YesWeHack terms and conditions, these Bug Bounty Program Terms and Conditions (“Program Terms”) govern the participation of any Hunter (“You”, or “Hunter”) in the Harman Bug Bounty Program.
In the event of a conflict between these Program Terms and any other agreement or terms, these Program Terms shall control.
Please adhere to the following rules while performing research on this program:
Denial of service (DoS) attacks on Harman International applications, servers, networks or infrastructure are strictly forbidden.
Avoid tests that could cause degradation or interruption of our services.
Do not use automated scanners or tools that generate large amount of network traffic
Do not leak, copy, manipulate, or destroy any user data or files in any of our applications/servers.
No vulnerability disclosure, full, partial or otherwise, is allowed.
Make sure to apply hunting requirements policy (User-Agent, VPN...)
We are happy to thank everyone who submits valid reports which help us improve the security of Harman International, however only those that meet the following eligibility requirements may receive a monetary reward:
You must be the first reporter of a vulnerability.
The vulnerability must be a qualifying vulnerability
The report must contain the following elements:
Clear textual description of the vulnerability, how it can be exploited, the security impact it has on the application, its users and Harman International, and remediation advice on fixing the vulnerability
Proof of exploitation: screenshots demonstrating the exploit was performed, and showing the final impact
Provide complete steps with the necessary information to reproduce the exploit, including (if necessary) code snippets, payloads, commands etc
You must not break any of the testing policy rules listed above
You must not be a former or current employee of Harman International or one of its contractors.
Reward amounts are based on:
Reward grid of the report's scope
CVSS scoring and actual business impact of the vulnerability upon performing risk analysis
We consider activities conducted in a manner consistent with these Program Terms to constitute “authorized” conduct under the United States Computer Fraud and Abuse Act, United States Digital Millennium Copyright Act, and any similar laws or regulations in other jurisdictions.
We will not pursue civil action or otherwise initiate a complaint or claim against you for circumventing the technological measures we have used to protect the applications in scope, so long as your activities are conducted in a manner consistent with these Program Terms.
We consider any activities conducted in a manner inconsistent with these Program Terms to be “unauthorized” conduct under the United States Computer Fraud and Abuse Act, and any similar laws or regulations in other jurisdictions. We reserve the right to take legal action against you for any such unauthorized conduct.
If your report addresses a vulnerability of a Harman business partner, Harman reserves the right to share your submission in its entirety, including your identity, with the business partner to help facilitate testing and resolution of the reported vulnerability. If legal action is initiated by a third party against you and you have complied with Harman’s Program Terms, Harman will take steps to make it known that your actions were conducted in compliance with these Program Terms.
If at any time you have concerns or are uncertain whether your security research is consistent with these Program Terms, or believe that these Program Terms do not address you security research, please inquire via www.yeswehack.com/contact/hunter-form before going any further.
These Program Terms shall be subject to the internal laws of the State of New York, USA and are binding upon the parties hereto in the United States and worldwide. You and Harman agree that any claims between You and Harman, including claims against you for unauthorized conduct shall be subject shall be subject to the jurisdiction of courts in the city of New York City, New York.
You are responsible for paying any taxes associated with rewards. We may modify these Program Terms or terminate this program at any time. We won’t apply any changes we make to these Program Terms retroactively.
Asset value | CVSS Low | CVSS Medium | CVSS High | CVSS Critical | Critical | $300 | $1,000 | $2,500 | $4,000 | High | $200 | $600 | $1,500 | $2,500 | Medium | $100 | $300 | $1,000 | $2,000 |
1st report100% 2nd report100% 3rd report0% 4th report0% 5th report0% 6th+ report0%
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program’s scope and policy. To summarize our policy, you may refer to the below table:
More info
Scope | Type | Asset value | Expand rewards grid | Device: JBL Bar 500MK2 | Other | High | | Low $200
Medium $600
High $1,500
Critical $2,500
| Device: JBL Bar 700MK2 | Other | High | | Low $200
Medium $600
High $1,500
Critical $2,500
| Device: JBL Bar 800MK2 | Other | High | | Low $200
Medium $600
High $1,500
Critical $2,500
| https://events.onecloud.harman.com | API | High | | Low $200
Medium $600
High $1,500
Critical $2,500
| https://ota.onecloud.harman.com | API | High | | Low $200
Medium $600
High $1,500
Critical $2,500
| https://apis.onecloud.harman.com | API | High | | Low $200
Medium $600
High $1,500
Critical $2,500
| https://edgeapis.onecloud.harman.com | API | Medium | | Low $100
Medium $300
High $1,000
Critical $2,000
| Device: JBL PartyBox Encore 2 | Other | Critical | | Low $300
Medium $1,000
High $2,500
Critical $4,000
| Device: JBL Live Beam 3 | Other | Critical | | Low $300
Medium $1,000
High $2,500
Critical $4,000
| Device: JBL Flip 7 | Other | Critical | | Low $300
Medium $1,000
High $2,500
Critical $4,000
| Device: JBL Tour One M3 | Other | Critical | | Low $300
Medium $1,000
High $2,500
Critical $4,000
| Device: JBL Charge 5 | Other | Critical | | Low $300
Medium $1,000
High $2,500
Critical $4,000
| Device: JBL Bar 300MK2 | Other | High | | Low $200
Medium $600
High $1,500
Critical $2,500
| Device: JBL Bar 1000MK2 | Other | High | | Low $200
Medium $600
High $1,500
Critical $2,500
| Device: JBL Bar 1300MK2 | Other | Critical | | Low $300
Medium $1,000
High $2,500
Critical $4,000
| Device: JBL Authentics 200 | Other | Medium | | Low $100
Medium $300
High $1,000
Critical $2,000
| Device: JBL Authentics 300 | Other | Medium | | Low $100
Medium $300
High $1,000
Critical $2,000
| Device: JBL Authentics 500 | Other | Medium | | Low $100
Medium $300
High $1,000
Critical $2,000
| Device: JBL Boombox 3 Wi-Fi | Other | Medium | | Low $100
Medium $300
High $1,000
Critical $2,000
| Device: JBL Charge 5 Wi-Fi | Other | Medium | | Low $100
Medium $300
High $1,000
Critical $2,000
| https://apps.apple.com/fr/app/jbl-one/id1610239857 | Mobile application IOS | Critical | | Low $300
Medium $1,000
High $2,500
Critical $4,000
| https://play.google.com/store/apps/details?id=com.jbl.oneapp&hl=fr&gl=US | Mobile application Android | Critical | | Low $300
Medium $1,000
High $2,500
Critical $4,000
| https://tms.onecloud.harman.com | API | Critical | | Low $300
Medium $1,000
High $2,500
Critical $4,000
| https://quantum-events.onecloud.harman.com | API | Medium | | Low $100
Medium $300
High $1,000
Critical $2,000
| https://bluetooth-events.onecloud.harman.com | API | Medium | | Low $100
Medium $300
High $1,000
Critical $2,000
|
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program’s scope and policy. To summarize our policy, you may refer to the below table:
More info
Type of leak Source of leak is in-scope Source of leak belongs to the Organization and is out-of-scope Source of leak does not belong to the Organization and is out-of-scope
Impact is in-scope (e.g. valid credentials on an in-scope asset) Eligible Eligible Not eligible
Impact is out-of-scope (e.g. valid credentials for an out-of-scope asset) Eligible Not eligible Not eligible
You can self-register wherever possible.
We have a limit of 40 characters for email addresses.
Please use your YesWeHack email aliases which are [https://yeswehack.com/user/my-yeswehack/email-alias](available here) for account creation, or if your aliases are too long, a regular email address containing the keyword "bugbounty" or your hunter username.
Please append to your user-agent header the following value: ' BugBounty-Harman '.
When submitting new report, you can add up to 5 collaborators, and define the reward split ratio.
For more information, see [https://helpcenter.yeswehack.io/hunter/hunter-collaboration](help center). Note: For reports that have already been rewarded, it is not possible to redistribute the rewards.
To submit a vulnerability report, you need to login with your hunter account. /programs/harman-international-public-bug-bounty/create-report