Skip to main content


Cyber Security Vulnerability Policy

Issuing Organisation: UK Sauter Automation Limited

Policy Summary:
This policy details the procedures for reporting and managing cyber security vulnerability in Sauter devices that are connected to the internet or other networks.

Sauter’s Cyber Security Objectives:

Building and maintaining a cyber defence across the Sauter IoT product range is a key element of Sauter’s development strategy in-line with IEC 62443-4-1. To aid us in our pursuit we welcome feedback on possible cyber security vulnerability relating to Sauter products. Where a vulnerability is reported the Sauter UK team in collaboration with the product manager will evaluate the information provided and act appropriately.

Reporting a Cyber Security Vulnerability:

To report a vulnerability, please complete the following form ensuring that all required fields are filled.

    Google reCAPTCHA must be loaded to send the formular.
    Google reCAPTCHA privacy policy

    Load Google reCAPTCHA

    Handling reports of security vulnerabilities:

    Product development at Sauter is an ongoing endeavour, with firmware updates being issued on an annual basis.

    Reports of potential vulnerabilities will be disclosed and handled in accordance with the “Common Vulnerability Scoring System“ (CVSS).


    This policy compiles with:

    • Part 1 of the Product Security and Telecommunications Infrastructure (PSTI) Act 2022
    • The Product Security and Telecommunications Infrastructure (Security Requirements for Relevant Connectable Products) Regulations 2023.
    © 2024  Fr. Sauter AG All rights reserved