Request Vulnerability Coordination Assistance

To submit a vulnerability report to Carestream’s Product Security Team, please submit the form below with a brief description of your discovery. Carestream will send a timely response to your submission (typically within five business days).

Independent cybersecurity researchers who discover and submit a vulnerability report to us may choose to receive credit after the submission has been accepted and validated by our product security team.

Contact Information

The name of the person submitting this form. You may use a pseudonym, alias, or handle in place of your real name.
If you are reporting on behalf of an organization, list its name here.
Your personal email address. Consider creating a free webmail account if you do not wish to share your email address.
The telephone where we may reach you if necessary.

Vulnerability Description

A version number, firmware version, build number, or release date is helpful for identifying affected products.
Describe the vulnerability in sufficient technical detail. Include a proof of concept if possible. You may describe multiple vulnerabilities here rather than submitting multiple forms, if the vulnerabilities affect the same product.
Explain access or other conditions necessary to attack.
Additional privileges, etc. Please be as specific as possible
Please note any specific tools or techniques used.
We will not share any comments in this field.