Intel® launches its first bug bounty program
At the CanSecWest Security conference on March 15, 2017, Intel launched its first Bug Bounty program targeted at Intel Products. We want to encourage researchers to identify issues and bring them to us directly so that we can take prompt steps to evaluate and correct them, and we want to recognize researchers for the work that they put in when researching a vulnerability. By partnering constructively with the security research community, we believe we will be better able to protect our customers. Read full details.
|Advisories provide fixes or workarounds for vulnerabilities identified with Intel products.|
|Latest Advisories||Last Updated|
|Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method||1/22/2018 10:01:34 AM|
|Untrusted search path in Intel Graphics Driver allows unprivileged user to elevate privileges via local access||1/16/2018 3:05:22 PM|
|Intel® NUC Kit with Infineon Trusted Platform Module||1/16/2018 10:10:15 AM|
|Intel Driver and Support Assistant Information Disclosure||1/9/2018 11:28:09 AM|
|Intel Q3’17 ME 6.x/7.x/8.x/9.x/10.x/11.x, SPS 4.0, and TXE 3.0 Security Review Cumulative Update||12/22/2017 6:34:09 AM|
For issues related to Intel managed open source projects, please visit http://www.01.org/security.
Please provide as much information as possible, including:
A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see: