Software vulnerability report
When should you use this form?
Please use this form if you have identified a security vulnerability that has already been exploited or poses an immediate risk to the system.
Examples include:
- Unauthorized access to equipment
- Execution of malicious code
- System manipulation without permission
For other issues
If you are reporting a potential vulnerability, general software issue, or product malfunction, please contact your usual ITW GSE support contact person.
What does “actively exploited” mean?
It means there is evidence that a vulnerability has already been used to gain unauthorized access or affect the system.
What happens after you submit?
- Our software team will review your report
- We may contact you for additional information
We will work to assess and resolve the issue as quickly as possible
Software Vulnerability Report
Once submitted, your report will be handled by our software team.
Customer Support
How can we help you?
Need schematics, spare-part lists or instructional videos? Use the ‘Product Assistance’ button.
Questions for Customer Support? Use the ‘Contact Customer Support’ button.
If your question involves a specific product, please provide the product’s serial number.