US Army Bug Bounty Program Fixes 118 Flaws

The Hack the Army program, sponsored by the US Army, received 400 bug reports and paid more than $100,000 to hackers who found 118 unique bugs.

Dark Reading Staff, Dark Reading

January 23, 2017

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Hack the Army, a bug bounty program launched by the US Army in November, received more than 400 bug reports in its three-week trial. Of these, 118 bugs were unique and could be fixed, reports Threatpost. White hat hackers and government employees were among 371 participants in the program, which paid upwards of $100,000.

"We recognize we cannot continue to do business the way that we are, and that we're not agile enough to keep up with things that are happening in the tech world," former Army Secretary Eric Fanning said while launching the program. "There are people all over the world trying to get access to our sites, our data, our information," he added.  

One of the concerns involved goarmy.com. The website had two bugs that could be used in tandem to access the internal Department of Defense website sans password, due to poor routing security and a vulnerability within the system.

"On its own, neither vulnerability is particularly interesting, but when you pair them together, it's actually very serious," explained HackerOne, the platform for Hack the Army and Hack the Pentagon, an earlier government bug bounty program.

Read details on Threatpost.

Read more about:

2017

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights