This document describes the security policy for SecuBox firmware, in compliance with EU Cyber Resilience Act (CRA) Article 13 §6 requirements for Class I products.
Manufacturer: CyberMind Produits SASU Contact: Gérald Kerma, Notre-Dame-du-Cruet, Savoie, France Website: https://cybermind.fr | https://secubox.in
| Version | Support Status | End of Support |
|---|---|---|
| 1.0.x | ✅ Current (Beta) | Active development |
| 0.19.x | ✅ LTS | March 2027 |
| 0.18.x | September 2026 | |
| < 0.18 | ❌ EOL | Unsupported |
The v1.0.0 Beta is now available for security testing. See BETA-RELEASE.md for:
- Attack surface overview
- High-value targets
- Known weak points (intentional disclosure)
- Bug bounty scope and reporting guidelines
Support policy:
- Current: All bug fixes and security patches
- LTS (Long Term Support): Critical security patches only, 18 months
- Security only: Critical vulnerabilities only, 6 months after next major release
- EOL (End of Life): No updates, upgrade strongly recommended
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
Email: security@cybermind.fr
PGP Key: 0xABCD1234
Fingerprint: 1234 5678 9ABC DEF0 1234 5678 9ABC DEF0 1234 5678
For critical vulnerabilities requiring immediate attention:
- Phone: +33 (0)4 79 XX XX XX (French business hours)
- Signal: Available upon request via email
We strongly recommend using PGP encryption for vulnerability reports. Our public key is available at:
Please provide:
- Description: Clear description of the vulnerability
- Impact: Potential security impact (confidentiality, integrity, availability)
- Affected versions: Which SecuBox versions are affected
- Reproduction steps: Step-by-step instructions to reproduce
- Proof of concept: Code, logs, or screenshots if applicable
- Suggested fix: If you have one (optional)
| Phase | Timeline |
|---|---|
| Acknowledgment | Within 48 hours |
| Initial triage | Within 5 business days |
| Status update | Every 7 days during investigation |
| Fix development | Depends on severity (see below) |
| Public disclosure | 90 days after fix, or coordinated |
Severity-based fix timeline:
- Critical (CVSS 9.0+): 7 days
- High (CVSS 7.0-8.9): 30 days
- Medium (CVSS 4.0-6.9): 60 days
- Low (CVSS < 4.0): Next regular release
As required by CRA Annex I, we publish machine-readable SBOMs for all releases.
SBOMs are attached to each GitHub Release:
- CycloneDX 1.6:
secubox-VERSION.cdx.json - SPDX 2.3:
secubox-VERSION.spdx.json - CVE Report:
secubox-VERSION-cve-report.json - Checksums:
checksums.sha256
Direct link: https://github.com/cybermind/secubox/releases/latest
Our SBOM includes:
- All OpenWrt base packages
- SecuBox custom packages and dependencies
- Kernel modules and firmware blobs
- Cryptographic libraries and versions
- License information (SPDX identifiers)
- PURL (Package URL) identifiers for each component
# Download SBOM and checksums
wget https://github.com/cybermind/secubox/releases/latest/download/secubox-0.20.cdx.json
wget https://github.com/cybermind/secubox/releases/latest/download/checksums.sha256
# Verify checksum
sha256sum -c checksums.sha256 --ignore-missingWe use Vulnerability Exploitability eXchange (VEX) documents to communicate the status of CVEs affecting SecuBox components.
See docs/vex-policy.md for our full VEX handling policy.
Status definitions:
not_affected: CVE does not affect SecuBox (component not used, conditions not met)affected: CVE affects SecuBox, fix in progressfixed: CVE fixed in specified versionunder_investigation: Analysis ongoing
VEX documents are published alongside releases:
secubox-VERSION.vex.json(CycloneDX VEX format)
SecuBox is a Class I product under the EU Cyber Resilience Act (Regulation 2024/XXX), as it is a router/VPN appliance with network connectivity functions.
Compliance status:
- ✅ SBOM published in machine-readable format (CycloneDX + SPDX)
- ✅ Vulnerability disclosure contact established
- ✅ Security update mechanism implemented (opkg + secubox-update)
- ✅ Default secure configuration
- ⏳ ANSSI CSPN certification: In progress (target Q3 2026)
We are pursuing ANSSI CSPN (Certification de Sécurité de Premier Niveau) certification for SecuBox, targeting completion in Q3 2026.
Certification scope:
- Firewall functionality
- VPN (WireGuard) implementation
- Intrusion detection (CrowdSec integration)
- Secure boot chain
- Update integrity verification
SecuBox implements multiple security layers:
- Network Segmentation: VLAN isolation, guest network separation
- WAF Protection: mitmproxy-based web application firewall
- Intrusion Detection: CrowdSec community threat intelligence
- Encrypted VPN: WireGuard with modern cryptography
- Access Control: SSO portal with MFA support
- Audit Logging: Comprehensive security event logging
SecuBox includes an AI Gateway that enforces data classification:
- LOCAL_ONLY: Sensitive data (IPs, credentials) never leaves device
- SANITIZED: PII scrubbed before EU cloud processing (Mistral)
- CLOUD_DIRECT: Generic queries to opted-in providers
See AI Gateway documentation for details.
SecuBox builds upon:
- OpenWrt: GPL-2.0, https://openwrt.org
- CrowdSec: MIT, https://crowdsec.net
- WireGuard: GPL-2.0, https://wireguard.com
- mitmproxy: MIT, https://mitmproxy.org
We monitor upstream security advisories and integrate patches promptly.
- Code review: All changes require peer review
- Dependency scanning: Automated CVE scanning in CI/CD
- SBOM generation: Automated with each release
- Reproducible builds: SOURCE_DATE_EPOCH enforced
- Signed releases: (Planned) cosign signatures for releases
- General security: security@cybermind.fr
- Support: support@cybermind.fr
- Commercial: contact@cybermind.fr
Address: CyberMind Produits SASU Notre-Dame-du-Cruet 73130 Savoie, France
Security researchers who have responsibly disclosed vulnerabilities:
| Researcher | Date | Severity | Description |
|---|---|---|---|
| Your name here | — | — | — |
We thank all contributors who help make SecuBox more secure.
Last updated: 2026-03-15 Document version: 1.1