Report a Vulnerability or Cybersecurity Concern Form.

At Deltek, we prioritize the security and integrity of our products and services. If you have identified a security concern or vulnerability in any of our products, or if you have any other type of security-related concern, we encourage you to report it to us promptly. Your proactive disclosure helps us maintain the highest standards of security and protect our users.


The purpose of this form is to ensure that all reports are submitted, reviewed, analyzed, and responded to in the most efficient manner possible.


Deltek Customers should also submit a case through the Deltek’s Customer Support Center. This ensures that your report is tracked and managed efficiently, allowing our Customer Support team to provide you with timely updates and resolutions.





    

Phone
Select or enter value
Caret IconCaret symbol

Customers must report concerns through Deltek's Customer Support Center to ensure a proper response, please include your Customer Support Case Number.

I acknowledge that no sensitive data should be submitted using this form. I will not include any Controlled Unclassified Information (CUI), Controlled Technical Information (CTI), International Traffic in Arms Regulations (ITAR) data, Federal Contract Information (FCI), Personally Identifiable Information (PII), or any other sensitive data in any attachments, screenshots, or form fields in this submission. I will provide only the necessary details and ensure that any sensitive information is excluded or obscured. If additional data is needed, Deltek will reach out separately to request it.

Select or enter value
Caret IconCaret symbol

Please provide a detailed description of the vulnerability, including the affected area or component, the conditions under which it can be exploited, and the potential impact of a successful attack.

Please ensure that your submission includes detailed and reproducible steps. It is essential to provide all necessary details, as Deltek requires thorough evidence to accurately assess potential vulnerabilities. These reproduction steps must clearly demonstrate that the vulnerability is not a false-positive and is indeed exploitable. Additionally, evidence of the exploitation steps must be included. Submissions that lack these essential steps or are generated from automated vulnerability scan exports will not be accepted.

Provide a clear summary of the concern, detailing its nature, affected systems, and symptoms. Include steps to reproduce the issue, if applicable, and provide technical details like error messages or logs, ensuring no sensitive data is shared. Describe the potential impact on systems, data, or users, including any known consequences such as data breaches or service disruptions. Specify the environment where the event occurred.

Would you like to include any attachments, screenshots, or other information to help us understand and address the incident more effectively? Please ensure that any shared information does not contain sensitive data.

Select or enter value
Caret IconCaret symbol

To ensure that the Deltek Security Team can accurately review and assess your report, please include a set of high-quality screenshots or attachments that clearly illustrate the reproduction steps. Screenshots should be full-screen, capture all relevant details, and be in high resolution to ensure clarity. No sensitive information should be included in the screenshots or attachments; they should be excluded or obscured.

Drag and drop files here or
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.