เลือกตำแหน่งที่ตั้งของคุณ:

สถานที่

กรุณาเลือกภาษา:

Cybersecurity at KUKA 

At KUKA, we place great emphasis on cybersecurity, because protecting your systems is our top priority. IT security remains a continuous process that we drive forward for you.


Secure together: device security needs cybersecurity

At KUKA, we ensure the security of your devices, systems and information in two ways. On the one hand, our team of experts constantly investigates and addresses vulnerabilities to possible attacks and identifies potential threats.

On the other hand, we offer you the opportunity to protect yourself by providing you with security updates for the continuous maintenance of your digital system. In doing so, our team is always available to answer your questions and support you.

 

Do you have any concerns? We are always here to help.

Are you a KUKA customer with security concerns or questions about cybersecurity? Our Customer Service will be happy to help you. For particularly urgent questions, our technical telephone support is available 24/7.

Keep your IT security up to date

Our products are designed for a long life cycle. In order to keep them secure, it is important that you regularly inform yourself and apply updates.

Closing vulnerabilities: Get involved!

You are a security specialist yourself and have discovered a potential vulnerability in one of our systems? Then inform us about it as soon as possible. That way, we can initiate the necessary countermeasures quickly and in a targeted manner.


Use KUKA's vulnerability reporting process

In the event of a potential security vulnerability in one of our products or services, we ask you first to maintain absolute confidentiality. KUKA's Product Security Incidence Response Team (PSIRT) will deal with your report immediately. Here's how to proceed in the event of a security-related discovery:

  • Detect vulnerability

    • Do not download, modify or delete the third party data in case of vulnerability

    • Do not carry out any attacks

    • Do not gain access to other systems

  • Report via email

  • What we need

    • IP address/URL of the affected service or in the case of products
    • Product name and version
    • Detailed problem description for better reproducibility
    • In case of more complex problems we will contact you
  • During the test

    • Do not make the problem public until the vulnerability is fixed
    • Keep the discovery absolutely confidential

We help you stay safe