Intel® launches its first bug bounty program
At the CanSecWest Security conference on March 15, 2017, Intel launched its first Bug Bounty program targeted at Intel Products. We want to encourage researchers to identify issues and bring them to us directly so that we can take prompt steps to evaluate and correct them, and we want to recognize researchers for the work that they put in when researching a vulnerability. By partnering constructively with the security research community, we believe we will be better able to protect our customers. Read full details.
|Advisories provide fixes or workarounds for vulnerabilities identified with Intel products.|
|Latest Advisories||Last Updated|
|One or more Intel Products affected by the Wi-Fi Protected Access II (WPA2) protocol vulnerability||10/16/2017 1:00:19 PM|
|Intel® NUC BIOS Security Updates||10/10/2017 4:18:49 PM|
|Intel AMT® Upgradable to Vulnerable Firmware||9/5/2017 3:04:32 PM|
|Intel® SSD 540s, Intel® SSD Pro 5400s, Intel® SSD E 5400s, and Intel® SSD DC S3100 data corruption vulnerability||8/8/2017 1:42:59 PM|
|Intel® SSD Pro 6000p Series data corruption vulnerability||8/8/2017 1:41:26 PM|
For issues related to Intel managed open source projects, please visit http://www.01.org/security.
Please provide as much information as possible, including:
A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see: