HackerOne · Bug Bounty

Logitech Bug Bounty Program

Complete guide to Logitech's bug bounty program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

Logitech runs a bug bounty program on HackerOne. The program has 86 in-scope assets and is managed by HackerOne's triage team.

86
In-Scope Assets
3h
Avg Response
68%
Efficiency
60d
Avg Bounty Time
47d
Avg Resolve

In-Scope Assets

AssetTypeMax SeverityEligible
*.cognitiveperformer.comWILDCARDMediumNo Bounty
*.crossclip.comWILDCARDCriticalNo Bounty
*.harmonyremote.comWILDCARDCriticalNo Bounty
*.logi.comWILDCARDCriticalNo Bounty
*.logicool.co.jpWILDCARDMediumNo Bounty
*.logitech-channel-marketing.comWILDCARDCriticalNo Bounty
*.logitech.comWILDCARDCriticalNo Bounty
*.logitech.ioWILDCARDCriticalNo Bounty
*.logitechauthorization.comWILDCARDCriticalNo Bounty
*.logitechg.com*WILDCARDCriticalNo Bounty
*.logitechmusic.comWILDCARDCriticalNo Bounty
*.lucra.liveWILDCARDCriticalNo Bounty
*.lukwerks.comWILDCARDMediumNo Bounty
*.melonapp.comWILDCARDCriticalNo Bounty
*.mevo.comWILDCARDCriticalNo Bounty
*.myharmony.comWILDCARDCriticalNo Bounty
*.mysqueezebox.comWILDCARDCriticalNo Bounty
*.oslo.ioWILDCARDCriticalNo Bounty
*.slimdevices.comWILDCARDCriticalNo Bounty
*.streamlabs.comWILDCARDCriticalBounty
*.streamlabscharity.comWILDCARDCriticalNo Bounty
*.uesmartradio.comWILDCARDCriticalNo Bounty
*.ultimateearsuniversity.comWILDCARDCriticalNo Bounty
*.wlo.linkWILDCARDCriticalNo Bounty
*vc.logitech.comWILDCARDCriticalBounty
1018340690APPLE_STORE_APP_IDCriticalBounty
1294578643APPLE_STORE_APP_IDCriticalBounty
1456293789APPLE_STORE_APP_IDHighBounty
1476615877APPLE_STORE_APP_IDCriticalBounty
632344648APPLE_STORE_APP_IDCriticalBounty
Circle CamerasHARDWARECriticalBounty
G HubDOWNLOADABLE_EXECUTABLESHighBounty
Harmony Remote SoftwareDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Harmony RemotesHARDWAREHighNo Bounty
Logi Options+ PC/MACDOWNLOADABLE_EXECUTABLESHighBounty
Logi Tune PC/MACDOWNLOADABLE_EXECUTABLESHighBounty
Logitech MIXLINEDOWNLOADABLE_EXECUTABLESCriticalBounty
Logitech Mice & KeyboardsHARDWAREHighBounty
Logitech Options PC/MACDOWNLOADABLE_EXECUTABLESHighNo Bounty
Logitech SyncDOWNLOADABLE_EXECUTABLESCriticalBounty
Other Logitech Desktop and Mobile ApplicationDOWNLOADABLE_EXECUTABLESCriticalNo Bounty
Other Logitech Hardware/IoTHARDWARECriticalNo Bounty
Presentation RemotesHARDWAREHighBounty
Scope Questions: Items not explicitly listed hereOTHERCriticalNo Bounty
Streamlabs Desktop Application PC/MACDOWNLOADABLE_EXECUTABLESCriticalBounty
USB Unifying and LightSpeed ReceiversHARDWARECriticalBounty
Ultimate Ears SpeakersHARDWAREMediumBounty
Video Conferencing ProductsHARDWARECriticalBounty
accounts.logi.comURLCriticalBounty
alert.logitech.comURLHighNo Bounty

Showing 50 of 86 in-scope assets. View all on HackerOne.

Out-of-Scope Assets

  • *.saitek-fr.com
  • *.saitek.com
  • *.saitekforum.com
  • *.wilife.com
  • Logitech Alert Cameras
  • Squeezebox Products

Tips for Hacking Logitech

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking Logitech?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does Logitech pay bounties?

Yes, Logitech offers monetary rewards for valid security vulnerabilities.

What types of vulnerabilities does Logitech accept?

Logitech accepts reports for vulnerabilities found in their 86 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.