• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • DroneRacingLife
  • DroneFlyers
  • Newsletter
DroneLife

DRONELIFE

Stay up to date on all the latest Drone News

  • News
  • Products
  • Industries
    • Agriculture
    • Construction
    • Delivery
    • Dual Use
    • Inspection
    • Public Safety
    • Surveying
  • Enthusiasts
  • Regulations
  • Business
  • Video
  • Podcasts

Inside DJI’s Flawed Bug Bounty Program

November 16, 2017 by Malek Murison 17 Comments

Bug Bounty programs are interesting, complex arrangements. In a way, they are an admission that every company building software is fallible and that mistakes can and will inevitably be made. They represent a well-established opportunity for collaboration between software companies and security researchers to prepare for that eventuality.

But that relationship is precarious. Bug Bounties are, after all, little more than a bribe negotiated between the two parties. A researcher will discover a vulnerability and the company impacted will pay for that issue to be kept quiet until it’s been resolved, as well as turn a blind eye toward how it was found in the first place.

So it goes without saying that Bug Bounty programs tend to have an interesting power dynamic. Huge companies are on one side and individual researchers are on the other. It’s up to both to behave ethically during the arrangement.

Which is where we come to DJI, the popular drone manufacturer that launched a Bounty program back in August. Usually, Bug Bounty programs are a preventative measure, the kind of thing a company puts in place to ensure they never have to deal with the PR fallout of a negative data security story. But in the case of DJI the move was reactive: the result of a summer of concerns about data security and weaknesses in the company’s software.

Putting Together a Bug Bounty Program in a Panic

Starting in July, it became clear that a drone jailbreaking scene was developing, with hackers finding ways to circumvent DJI’s built-in safety features – including GEO, the system designed to prevent pilots from flying above the legal limit and in restricted airspace. There were multiple stories of airport near misses and, presumably, many of those involved DJI aircraft. Then there were the probably not unconnected reports of the US and Australian militaries grounding DJI equipment over concerns regarding ‘cyber vulnerabilities’.

On top of that, there were elements of code – since rectified – found in DJI applications that were suspicious at best.

Understandably, all of this led to a range of measures from the Chinese manufacturer as part of a wider strategy to reassure customers that their data and drones were secure. One of these measures was the Bug Bounty program, set up to foster a more positive relationship with the security community, which had until then been both critical of DJI software and actively exploiting it.

On the face of it, the Bug Bounty program was, and remains, a positive step. And it was a sensible one that any company in DJI’s position should be making. The intentions were good: find the bugs, fix the bugs and reward ethical hackers for highlighting issues in the right way.

But the relationship between company and security researchers was always going to be precarious for two reasons. On the one hand, many of the hackers going after bounties were the same ones actively exploiting vulnerabilities in DJI’s software to customize their flying experience.

As one researcher, David Kovar, pointed out, “this group consists of very legitimate cybersecurity researchers. They were not seeking to make money, they were practising their craft on an ecosystem they are passionate about. A fairly traditional way for firms to keep disclosures from going public is via a bug bounty program, which this group tried to help them, DJI, establish.”

Kovar’s final point is the second reason that relationship was and remains so precarious. Essentially, DJI was making up the Bounty program as it went along with the help of the same external security researchers. The result was that bounty reports were submitted before researchers had any idea about the terms and conditions they were signing up to.

I asked two researchers who submitted bounties why they had done so before the terms of the agreement were clear. They made the point that big companies – The likes of Apple, Uber and United Airlines all have similar schemes in place – are usually trustworthy when it comes to paying out bounties and crediting the source of the fixed vulnerability. There was also an acceptance that DJI was new to the scene and that a certain level of patience was required.

Walking Away From the Bounty

DroneLife understands that the majority of researchers offered bounties by DJI after submitting successful reports have decided to walk away from the agreement. This is because the terms of the NDA – offered in retrospect by DJI – have been deemed unacceptable. It’s also related to a sudden threat of legal action with regards to the Computer Fraud and Abuse Act that understandably soured what was looking like a positive working relationship.

One thing researchers want when putting their necks on the line to find security issues is protection. You don’t want to get sued for essentially helping out a corporate giant, and you don’t want to hold any kind of liability moving forward once the bug has been reported and fixed. It’s also standard practice to be credited for the finding.

Researcher Kevin Finisterre, who was offered $30,000 for his bounty report, had the following to say in a document he published last night:

I won’t go into too much detail, but the agreement that was put in front of me by DJI in essence did not offer researchers any sort of protection. For me personally the wording put my right to work at risk, and posed a direct conflicts of interest to many things including my freedom of speech. It almost seemed like a joke. It was pretty clear the entire ‘Bug Bounty’ program was rushed based on this alone.

Several progressions were made in making the wording more acceptable, I must actually credit Brendan Schulman on attempting to serve as a communication bridge between myself and his Chinese counterparts in the legal department in Guangdong. Unfortunately he was not able to keep the barbarians at the gate, and I received a thinly veiled Computer Fraud and Abuse Act threat from DJI.

bug bounty nda email
An emailed response from Kevin Finisterre to DJI’s Brendan Schulman, concerning the details of the Bug Bounty NDA.

A Collision of Cultures?

It’s difficult to know where the responsibility lies for the complications that have arisen with DJI’s Bug Bounty program. From the emails highlighted in Finisterre’s report, it appears as though DJI’s Brendan Schulman is in a difficult position: trying to find the right balance between an agreement that will satisfy both his employers in Shenzhen and the security researchers ostensibly doing his company a favor. The fact that the CFAA legal threat (below) came directly from China is a case in point.

The fact that it was sent while NDA negotiations were ongoing says a lot.

dji bug bounty
A thinly veiled threat sent to a researcher after submitting a successful bounty report.

The above letter could be viewed as a move to pressure Finisterre into signing the Bounty agreement. We don’t know if that’s the case, but in his own words, the NDA “was not only extremely risky, but was likely crafted in bad faith to silence anyone that signed it.”

It could be that this stance from DJI is the symptom of a collision of cultures. Chinese companies are not known for their tolerance of dissent; freedom of speech can be seen more as a privilege than a fundamental right. That much is clear from the statement in the original NDA that inclines Finisterre to cease making “untrue or misleading statements regarding DJI, its directors, officers, employees, products and services; or this agreement..”

So we might expect some friction when dealing with a topic this sensitive. Schulman himself states in the emails that he’s having to make significant effort to “bridge the divide”. The term “huge concession” is also used at one point.

But whatever the relationship and lack of joined-up thinking between the US DJI team and its colleagues in China, much of this fuss and confusion have arisen from the fact that the Bug Bounty program was announced in a rush for PR reasons. It simply hasn’t been put together with the consideration and thought something this sensitive requires.

Final Thoughts

Since the publication of Finisterre’s account online, DJI has launched the Bug Bounty website, with terms and conditions for researchers keen to submit reports – 11 weeks after the program went live.

It’s fair to say that those terms and conditions are not quite in line with what researchers would like to see. One example is disclosure. As well as giving credit to the researcher who discovered the security bug, the company would ideally make public the neutralized threat. However:

DJI understands the importance of public disclosure of unknown or novel security flaws to build a common base of knowledge within the security community and to build a safer internet. DJI is committed to disclosing such information to the fullest extent possible. However, DJI in its sole discretion will decide when and how, and to what extent of details, to disclose to the public the bugs/vulnerabilities reported by you.

A case in point is the company’s SSL Certificate leak, which has today been announced in tandem with its disclosure in Finisterre’s report. According to a DJI statement, the manufacturer changed its SSL certificate “on September 3rd after learning that the certificate may have been compromised.”

“At this time,” the company says, “DJI has no evidence that any user information was compromised as a result of this vulnerability.”

However, by leaving the private key for its dot-com’s HTTPS certificate sitting on GitHub, DJI gave nefarious hackers all they needed to create false versions of the manufacturer’s website with the correct HTTPS certificate, before redirecting unsuspecting victims to malicious forgeries and downloads, according to The Register. 

Finisterre points out in his report that a similar security lapse with the Amazon Web Services key allowed him to see “unencrypted flight logs, passports, drivers licenses, and Identification Cards,” adding up to a situation he described as a “full infrastructure compromise.”

That it took so long for the company to disclose that customers and their information were put at risk is pretty damning.

Another part of the Bounty policy which may raise an eyebrow is the section regarding indemnification:

You will defend and indemnify DJI and its officers, directors, employees, consultants, affiliates, subsidiaries and agents (together, the “DJI Entities”) from and against any and all claims, liabilities, damages, losses, and expenses, including reasonable attorneys’ fees and costs, arising out of or in any way connected with: (a) your Report; (b) your violation of any portion of these Terms, any representation, warranty, or agreement referenced in these Terms, or any applicable law or regulation; (c) your violation of any third-party rights, including any intellectual property right or publicity, confidentiality, other property, or privacy, right; or (d) any dispute between you and any third party; (e) your improper use of this Program.

This section appears to state that researchers could end up owing DJI compensation for claims, liabilities, legal fees and damages that result from successful reports. Similar text can be found in Bounty policies for Paypal, for example.

There’s also ambiguity throughout the policy that could easily fall in the company’s favor regarding the scope of where bugs can be found.

“That official announcement is full of loopholes in favor of DJI,” said David Kovar. “They’re not committing to paying for anything, they can kick you out without paying… what is out of scope is a laundry list of bugs they aren’t interested in fixing; they alone can decide that you “attacked” their infrastructure even if it is listed as “in scope”.

So where will DJI go from here? The company took an important and correct step in setting up this program, whether or not it was motivated by public relations rather than the need to prioritize security. But its implementation has been clumsy to say the least. Going forward, these missteps should be ironed out.

It should also be noted that while Finisterre and others have walked away from considerable bounties due to the terms of the NDA, there have been a number of successful payouts totalling more than $3,000.

A robust, ethical Bounty program is needed to help keep customers’ data secure while properly rewarding those who find weaknesses in DJI’s security. Let’s hope no more researchers have to walk away from DJI and its bounties in the future. A positive relationship between the two can only be a good thing.

Malek Murison
Malek Murison

Malek Murison is a freelance writer and editor with a passion for tech trends and innovation. He handles product reviews, major releases and keeps an eye on the enthusiast market for DroneLife.
Email Malek
Twitter:@malekmurison

Subscribe to DroneLife here.

Filed Under: Business and Finance, DL Exclusive, Drone News Feeds, Enthusiasts, Featured, Featured – Safety and Security, News Tagged With: bug bounty, DJI, PR, security, SSL

Reader Interactions

Trackbacks

  1. DJI Aims to Ease Security Fears for Good with Government Edi… – UAV – DRONEENEWS.COM says:
    June 24, 2019 at 9:47 pm

    […] data. The company has patched security flaws found by researchers, established and developed a bug bounty program, commissioned a security audit of its app and servers, launched a local data mode to prevent […]

    Reply
  2. quadcopter | Australian Air Force Inspect Aircraft with DJI Drones says:
    November 27, 2018 at 2:04 pm

    […] got its act together pretty quickly: A bug bounty program was introduced – admittedly with some issues at first. Independent cybersecurity reports were commissioned; concerns have been […]

    Reply
  3. Cybersecurity Firm Reveals Vulnerability in DJI's Infrastruc... – UAV - THATDRONENEWS.COM says:
    November 10, 2018 at 12:07 pm

    […] Point submitted a report to DJI’s Bug Bounty Program, highlighting a process in which an attacker could have gained access to a user’s account through […]

    Reply
  4. Cybersecurity Firm Reveals Vulnerability in DJI’s Infrastructure (It’s Patched Now) | News and Reviews about Drones, Quadcopter, Camera says:
    November 9, 2018 at 11:22 pm

    […] Point submitted a report to DJI’s Bug Bounty Program, highlighting a process in which an attacker could have gained access to a user’s account through […]

    Reply
  5. Cybersecurity Firm Reveals Vulnerability in DJI’s Infrastructure (It’s Patched Now) - Drones Crunch says:
    November 8, 2018 at 12:37 pm

    […] Point submitted a report to DJI’s Bug Bounty Program, highlighting a process in which an attacker could have gained access to a user’s account […]

    Reply
  6. Independent DJI report aims to ease drone security fears | Internet of Business says:
    April 24, 2018 at 6:15 pm

    […] researcher Kevin Finisterre – an employee of counter-drone company Department 13 who would later back away from DJI’s bug bounty scheme in controversial circumstances – then made public several flaws in DJI’s security […]

    Reply
  7. DJI Releases Results of Data Security Study - Drones Crunch says:
    April 24, 2018 at 6:39 am

    […] Read more: Inside DJI’s Flawed Bug Bounty Program […]

    Reply
  8. DJI seeks $500m investment with IPO in the pipeline - The Drone News says:
    March 22, 2018 at 3:33 pm

    […] drone markets, the company has been tarnished in recent times with fears over data security and a bug bounty program that started with a […]

    Reply
  9. drone helicopter | DJI Responds to Bug Bounty Issues, SSL & AWS Leaks and ICE Memo says:
    November 25, 2017 at 11:01 am

    […] You can read more about the Bug Bounty program here. […]

    Reply
  10. DJI Responds to Bug Bounty Issues, SSL & AWS Leaks and ICE Memo - The Drone News says:
    November 25, 2017 at 4:48 am

    […] You can read more about the Bug Bounty program here. […]

    Reply
  11. DJI Responds to Bug Bounty Points, SSL & AWS Leaks and ICE Memo | DRONEPETS.ORG says:
    November 25, 2017 at 2:09 am

    […] You may learn extra concerning the Bug Bounty program right here. […]

    Reply
  12. DJI Responds to Bug Bounty Issues, SSL & AWS Leaks and ICE Memo | News and Reviews about Drones, Quadcopter, Camera says:
    November 24, 2017 at 10:03 pm

    […] You can read more about the Bug Bounty program here. […]

    Reply
  13. DJI Responds to Bug Bounty Issues, SSL & AWS Leaks and ICE Memo – TopCopter.cz says:
    November 24, 2017 at 12:19 pm

    […] You can read more about the Bug Bounty program here. […]

    Reply
  14. Department 13's Critique of Aeroscope & The DJI Response - Latest & Breaking News says:
    November 20, 2017 at 4:14 pm

    […] necessarily be viewed in the context of the recently made-public bug bounty spat between DJI and Department 13’s Kevin Finisterre. Instead, it’s a first-impression account of Aeroscope from a technical […]

    Reply
  15. Department 13 Releases Critique of DJI’s Aeroscope – TopCopter.cz says:
    November 20, 2017 at 1:59 pm

    […] necessarily be viewed in the context of the recently made-public bug bounty spat between DJI and Department 13’s Kevin Finisterre. Instead, it’s a first-impression account of Aeroscope from a technical […]

    Reply
  16. Inside DJI’s Flawed Bug Bounty Program says:
    November 16, 2017 at 5:58 pm

    […] Inside DJI’s Flawed Bug Bounty Program […]

    Reply
  17. Inside DJI’s Flawed Bug Bounty Program – Dronegram says:
    November 16, 2017 at 11:59 am

    […] post Inside DJI’s Flawed Bug Bounty Program appeared first on […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

LATEST

Massachusetts Facing Hurdles in Developing World Cup Counter-UAS

By Dronelife Features Editor Jim Magill (Editor’s note: This is the third in a series of stories on efforts to…

Continue Reading Massachusetts Facing Hurdles in Developing World Cup Counter-UAS

Walmart and Wing Launch Major Drone Delivery Expansion from Houston

By Dronelife Features Editor Jim Magill Eighteen lightweight UAVs sit on takeoff pads in the parking lot of a Walmart…

Continue Reading Walmart and Wing Launch Major Drone Delivery Expansion from Houston

Windracers ULTRA Achieves 2,000km Range with Heavy-Lift Payload Capability

British drone manufacturer Windracers has announced that its ULTRA heavy-lift drone can now fly up to 2,000km in a single…

Continue Reading Windracers ULTRA Achieves 2,000km Range with Heavy-Lift Payload Capability

NPSA Launches 2026 Counter-UAS Equipment Evaluations for UK Manufacturers

The National Protective Security Authority (NPSA) has opened expressions of interest for manufacturers and suppliers to participate in its independent…

Continue Reading NPSA Launches 2026 Counter-UAS Equipment Evaluations for UK Manufacturers

ISight Drone Services Achieves Statewide BVLOS Authorization for Vantis System in North Dakota

ISight Drone Services has received FAA approval to conduct beyond-visual-line-of-sight (BVLOS) operations across all four operational volumes of Vantis, North…

Continue Reading ISight Drone Services Achieves Statewide BVLOS Authorization for Vantis System in North Dakota

Unifly Completes FAA-Led Detect-and-Avoid Safety Standards Project

Terra Drone’s subsidiary Unifly has completed validation of “Well Clear Requirements” for drone Detect-and-Avoid (DAA) systems under the FAA’s ASSURE…

Continue Reading Unifly Completes FAA-Led Detect-and-Avoid Safety Standards Project

Meteodrones Provide New Data to National Weather Service

Switzerland-based meteorology data company Meteomatics has announced a partnership with NOAA’s National Mesonet Program (NMP) to integrate operational weather drone…

Continue Reading Meteodrones Provide New Data to National Weather Service

AURA Network Systems Conducts BVLOS Communications Tests

In collaboration with the Northern Plains UAS Test Site (NPUASTS) and the Federal Aviation Administration (FAA), AURA Network Systems has…

Continue Reading AURA Network Systems Conducts BVLOS Communications Tests

JIATF Awards First Replicator 2 Contract for C-UAS System

The Joint Interagency Task Force 401 (JIATF 401) has awarded its first contract under the Replicator 2 initiative, procuring two…

Continue Reading JIATF Awards First Replicator 2 Contract for C-UAS System

FAA Adds Two New UAS Test Sites to Advance Drone Integration

The U.S. Department of Transportation and the Federal Aviation Administration have announced two new UAS Test Sites in partnership with…

Continue Reading FAA Adds Two New UAS Test Sites to Advance Drone Integration

Secondary Sidebar

Footer

SPONSORED

Inspired Flight Gremsy IF800 VIO F1 drones geo week

What Will It Take to Strengthen U.S. Drone Manufacturing? A Conversation with Inspired Flight’s CEO

Global Mapper Mobile data collection

Collection Ground Control Points with Global Mapper Mobile

Military Drone Mapping Solutions

How SimActive’s Correlator3D™ is Revolutionizing Military Mapping: An Exclusive Interview with CEO Philippe Simard

Photogrammetry Accuracy Standards

SimActive Photogrammetry Software: Enabling Users to Meet Accuracy Standards for Over 20 Years

NACT Engineering Parrot ANAFI tether indoor shot

Smart Tether for Parrot ANAFI USA from NACT Engineering

Blue Marble, features global mapper, features Blue Marble

Check Out These New Features in Global Mapper v25 from Blue Marble

About Us | Contact Us | Advertise With Us | Write for Us | Privacy Policy | Terms of Service

The Trusted Source for the Business of Drones.

This website uses cookies and third party services. By clicking OK, you are agreeing to our privacy policy. ACCEPT

Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT