Intel® launches its first bug bounty program
At the CanSecWest Security conference on March 15, 2017, Intel launched its first Bug Bounty program targeted at Intel Products. We want to encourage researchers to identify issues and bring them to us directly so that we can take prompt steps to evaluate and correct them, and we want to recognize researchers for the work that they put in when researching a vulnerability. By partnering constructively with the security research community, we believe we will be better able to protect our customers. Read full details.
|Advisories provide fixes or workarounds for vulnerabilities identified with Intel products.|
|Latest Advisories||Last Updated|
|Type Confusion in Content Protection HECI Service in Intel® Graphics Driver allows unprivileged user to elevate privileges via local access||12/12/2017 8:18:16 AM|
|One or more Intel Products affected by the Wi-Fi Protected Access II (WPA2) protocol vulnerability||12/7/2017 4:21:24 PM|
|Frame replay vulnerability in Wi-Fi subsystem in Intel® Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle||12/7/2017 3:19:19 PM|
|Intel Q3’17 ME 11.x, SPS 4.0, and TXE 3.0 Security Review Cumulative Update||12/1/2017 3:12:39 PM|
|Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Escalation of Privilege||12/1/2017 1:56:09 PM|
For issues related to Intel managed open source projects, please visit http://www.01.org/security.
Please provide as much information as possible, including:
A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see: