ST's Product Security Incident Response Team (ST PSIRT) supervises the process of accepting and responding to reports of potential security vulnerabilities involving ST hardware and software products.
ST places a high priority on security, and ST PSIRT is committed to rapidly addressing potential security vulnerabilities affecting our products. Our long history and vast experience in security allows ST to perform clear analyses and provide appropriate guidance on mitigations and solutions when applicable.
If you wish to report a potential security vulnerability regarding our products, we encourage you to report it to ST PSIRT by following the steps described on this page.
To report a potential security vulnerability, please contact ST PSIRT at psirt@st.com.
All exchanges and reports must be provided in English.
Because of the sensitive nature of such reporting, ST PSIRT highly encourages all potential security vulnerability reports to be sent encrypted, using the ST PSIRT PGP/GPG Key:
Free software to read and author PGP/GPG encrypted messages may be obtained from:
STMicroelectronics N.V., on behalf of itself, its affiliates and subsidiaries, (collectively “ST”) takes all potential security vulnerability reports or other related communications (“Report(s)”) seriously. In order to review Your Report (the terms “You” and “Yours” include your employer, and all affiliates, subsidiaries and related persons or entities) and take actions as deemed appropriate, ST requires that we have the rights and Your permission to do so.
As such, by submitting Your Report to ST, You agree that You have the right to do so, and You grant to ST the rights to use the Report for purposes related to security vulnerability analysis, testing, correction, patching, reporting and any other related purpose or function.
To allow ST PSIRT to process the reported potential security vulnerability, you should provide the following information:
Insufficient information may prevent ST from evaluating the request.
Once submitted, ST PSIRT will manage the reported potential security vulnerability according to the following process:
Documents are only available in English.
Resource title | ID | Version | Latest update |
---|---|---|---|
TN1436-ST-PSIRT | 2.0 | 13 Dec 2022 | |
TN1457-ST-PSIRT | 1.0 | 21 Mar 23 | |
TN1474-ST-PSIRT | 1.0 | 07 Jun 2023 | |
TN1488-ST-PSIRT | 1.0 | 11 Oct 2023 | |
TN1489-ST-PSIRT | 1.0 | 09 Oct 2023 | |
TN1491-ST-PSIRT | 2.0 | 13 Dec 2023 | |
TN1492-ST-PSIRT | 1.0 | 11 Oct 2023 | |
TN1493-ST-PSIRT | 1.0 | 11 Oct 2023 | |
TN1500-ST-PSIRT | 2.0 | 02 Feb 2023 | |
TN1514-ST-PSIRT | 1.0 | 09 Apr 2024 | |
TN1518-ST-PSIRT | 1.0 | 31 May 2024 | |
TN1530-ST-PSIRT | 1.0 | 31 May 2024 | |
TN1528-ST-PSIRT | 1.0 | 14 Jun 2024 | |
TN1537-ST-PSIRT | 1.0 | 08 Jul 2024 | |
TN1529-ST-PSIRT | 1.0 | 18 Jul 2024 | |
TN1542-ST-PSIRT | 1.0 | 10 Sept 2024 | |
TN1552-ST-PSIRT | 1.0 | 1 Oct 2024 | |
SA0022 | 1.0 | 24 Oct 2024 | |
SB0023 | 1.0 | 25 Oct 2024 | |
SB0032 | 1.0 | 19 Dec 2024 | |
SB0033 | 1.0 | 19 Dec 2024 | |
SA0024 | 1.0 | 06 Jan 2025 |
Documents are only available in English.
TN1489-ST-PSIRT
1.0
09 Oct 2023
TN1492-ST-PSIRT
1.0
11 Oct 2023
TN1493-ST-PSIRT
1.0
11 Oct 2023
TN1500-ST-PSIRT
2.0
02 Feb 2023
SA0022
1.0
24 Oct 2024
SB0023
1.0
25 Oct 2024
SB0032
1.0
19 Dec 2024
SB0033
1.0
19 Dec 2024
The above should not be deemed a complete list of all security incidents related to ST Products. If you wish to find out more about the security status of a particular ST Product, please contact your ST sales representative.