logo
Security Policy
Last updated: May 2026


1. Introduction

MuLogic BV is committed to ensuring the security of its products.

This policy describes how we handle security vulnerabilities, provide security updates,
and work with the security community.



What Qualifies as a Valid Security Report

A valid report describes a previously unreported, reproducible vulnerability in our products,
with a demonstrable security impact, discovered through good-faith testing.


What Does Not Qualify as a Valid Security Report

Questions about publicly known CVEs or news headlines (please contact support instead),
raw scanner output without manual validation, theoretical issues with no proof of concept,
and low-impact findings such as missing security headers, clickjacking on non-sensitive
pages, or outdated library versions without a working exploit, etc.
Reports must include clear reproduction steps.


2. Reporting a Vulnerability

If you discover a security vulnerability in any MuLogic product, please report it to:
Email: security@mulogic.com

When reporting, please include:
Vague reports such as "we have discovered something, please contact us" are not
considered valid and will receive no response.

We accept reports in English, Dutch, and German.



3. Our Response

After receiving a valid vulnerability report, we will:
For vulnerabilities that are actively exploited, we will prioritize an expedited response.


4. Coordinated Disclosure

We ask reporters to:

MuLogic BV will:


5. Security Updates

For all MuLogic products sold after December 2027, MuLogic BV provides security updates
for a minimum of 5 years after end-of-sale.

Security updates are made available as firmware updates and can be installed through the
product's web interface, or via one of the automated firmware update methods.


Critical security updates will be accompanied by a security advisory describing the vulnerability
and its resolution.



6. Scope

This policy applies to all MuLogic products, including any embedded management software and
web interface.


Third-party components included in the firmware (such as open-source libraries) are covered by
this policy to the extent that they are part of the delivered product.



7. Contact

https://mulogic.com/contact/
Email: security@mulogic.com