Acer is committed to designing products and services that adhere to the highest security standards. In an effort to better protect our customers and their data, we are welcoming any information about potential security vulnerabilities from security researchers, academics, and other members of the security community.
We are ready to work with those who bring such vulnerabilities to our attention and will acknowledge all relevant submissions. Acer will only validate vulnerabilities that are reproducible using the most current software versions available at https://www.acer.com/ac/en/US/content/support.
Important: Acer recommends submitters utilize Acer Product Security PGP key to encrypt for emails that contain sensitive information. Please use the public key below to encrypt your vulnerability submission.