Google’s increased rewards for its Chrome Vulnerability Reward Program (VRP) reflect a strong commitment to enhancing browser security by incentivizing researchers to identify and report critical flaws. The program now offers up to $250,000 for finding severe vulnerabilities, up from previous reward levels, underscoring the importance Google places on discovering and addressing high-risk issues.
The revamped focus on memory corruption vulnerabilities highlights the need for deeper and more thorough research. Memory corruption flaws can lead to severe security issues, including system crashes and unauthorized access, making them crucial targets for security researchers. By increasing rewards and restructuring vulnerability categories, Google aims to attract top-tier talent and promptly address critical issues.
Rewards program increases
“The maximum reward for a single vulnerability has been increased to $250,000, specifically for demonstrating remote code execution (RCE) exploits in non-isolated processes,” stated Amy Ressler, an information security engineer.
Google has also adjusted reward amounts for other vulnerability categories, ranging from $1,000 to $30,000, depending on the severity and exploitability of the flaw. Additionally, successful bypasses of MiraclePtr, a technology designed to protect Chrome from memory corruption vulnerabilities, can now earn a reward of up to $250,128.
It’s important to note that reports must demonstrate a real security impact or potential harm to users to be eligible for rewards. Theoretical issues or reports without practical implications are unlikely to qualify.
Google has reiterated its commitment to expanding the bounty program and exploring new opportunities to engage with the security community.