Select your location:

Country

Cybersecurity at KUKA 

At KUKA, we place great emphasis on cybersecurity, because protecting your systems is our top priority. IT security remains a continuous process that we drive forward for you.


Secure together: device security needs cybersecurity

At KUKA, we ensure the security of your devices, systems and information in two ways. On the one hand, our team of experts constantly investigates and addresses vulnerabilities to possible attacks and identifies potential threats.

On the other hand, we offer you the opportunity to protect yourself by providing you with security updates for the continuous maintenance of your digital system. In doing so, our team is always available to answer your questions and support you.

 

Do you have any concerns? We are always here to help.

Are you a KUKA customer with security concerns or questions about cybersecurity? Our Customer Service will be happy to help you. For particularly urgent questions, our technical telephone support is available 24/7.

Keep your IT security up to date

Our products are designed for a long life cycle. In order to keep them secure, it is important that you regularly inform yourself and apply updates.

Closing vulnerabilities: Get involved!

You are a security specialist yourself and have discovered a potential vulnerability in one of our systems? Then inform us about it as soon as possible. That way, we can initiate the necessary countermeasures quickly and in a targeted manner.


Use KUKA's vulnerability reporting process

In the event of a potential security vulnerability in one of our products or services, we ask you first to maintain absolute confidentiality. KUKA's Product Security Incidence Response Team (PSIRT) will deal with your report immediately. Here's how to proceed in the event of a security-related discovery:

  • Detect vulnerability

    • Do not download, modify or delete the third party data in case of vulnerability

    • Do not carry out any attacks

    • Do not gain access to other systems

  • Report via email

  • What we need

    • IP address/URL of the affected service or in the case of products
    • Product name and version
    • Detailed problem description for better reproducibility
    • In case of more complex problems we will contact you
  • During the test

    • Do not make the problem public until the vulnerability is fixed
    • Keep the discovery absolutely confidential

Our promise

We act quickly and transparently, keep you informed and reward your support.

  • We will respond to your report within 3 business days, assess the vulnerability, and provide you with the estimated resolution date.

  • We will keep your report strictly confidential. Your personal information will not be shared with third parties without your consent.

  • We will keep you informed about the progress in resolving the issue.

  • We will inform you about any security issues and provide you with the latest security updates and software packages.
  • We name you as the discoverer when we publish information about the reported problem (unless you request otherwise).

This website uses cookies (find out more) in order to offer you the best service online as well. If you simply continue to use our website, we will only use cookies required for technical purposes. If you click on “OK and discover KUKA”, you are also agreeing to the additional use of marketing cookies. You can select which cookies we use by clicking on “Cookie settings”.

Cookie settings