Product Security Support

Product Security Incident Response Process
This portal is dedicated to promptly addressing security vulnerabilities in iMQ products. iMQ responds to reported issues, documents findings, and provides customers with clear, actionable guidance regarding the impact, severity, and appropriate mitigation measures.

Scope of Security Incidents
iMQ is responsible for investigating and managing a range of security-related issues. The following cases fall within its scope:
  • Security incidents affecting iMQ products, including both hardware and software components.
  • Inaccuracies or flaws in iMQ documentation related to security information or recommendations (e.g., datasheets, application notes).
  • Unauthorized access to security-sensitive iMQ documents or security-related information found in unintended or public locations.

Security Vulnerability Management Process
Security vulnerabilities in iMQ products are actively managed through a structured process designed to ensure timely and effective resolution. Response times may vary depending on the complexity and severity of the issue. The process consists of four key steps:
Reporting
Upon receiving a report, iMQ acknowledges the submission and provides the reporter with updates throughout the handling process.
Evaluation
iMQ verifies the potential vulnerability, assesses the associated risks, determines the potential impact, and assigns a processing priority.
Solution
Where applicable, iMQ develops appropriate mitigation strategies or fixes to address the confirmed security vulnerability.
Communication
In most cases, iMQ communicates directly with affected customers, providing relevant details about the vulnerability and the available solution.

Reporting a Potential Security Vulnerability
If you believe you have identified a potential security vulnerability in an iMQ product, please contact Technical Support at supports@imqtech.com directly. iMQ strives to acknowledge all reported vulnerabilities within 24 hours of receipt. Please note that response times may extend to 72 hours during weekends or holidays, depending on the urgency of the issue. If you do not receive a response within this timeframe, we recommend resending your message.
To help us assess and respond to your report effectively, please provide the following information (in English):
  • The product name and version(s) affected
  • A detailed description of the suspected vulnerability
  • Any known exploits or methods for reproducing the issue
Due to the sensitive nature of vulnerability information, iMQ strongly recommends that all security reports be encrypted using the official iMQ PGP Key.
Download iMQ PGP Key.

Responsible Disclosure
iMQ works closely with vulnerability reporters to ensure responsible disclosure that protects customer security while maintaining transparency. Because iMQ products are embedded chips often deployed in environments where updates are difficult or impossible, public disclosure may require: extended timeframes for customer mitigation, limited technical details in disclosures, anonymous or partial disclosures to avoid identifying affected products. This approach allows customers time to implement safeguards before vulnerabilities are widely known.