Security Advisories

Advisories provide information about vulnerabilities identified with Intel® products, including any fixes or workarounds.

Advisories Last Updated
Type Confusion in Content Protection HECI Service in Intel® Graphics Driver allows unprivileged user to elevate privileges via local access 12/12/2017 8:18:16 AM
One or more Intel Products affected by the Wi-Fi Protected Access II (WPA2) protocol vulnerability 12/7/2017 4:21:24 PM
Frame replay vulnerability in Wi-Fi subsystem in Intel® Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle 12/7/2017 3:19:19 PM
Intel Q3’17 ME 11.x, SPS 4.0, and TXE 3.0 Security Review Cumulative Update 12/1/2017 3:12:39 PM
Intel Active Management Technology, Intel Small Business Technology, and Intel Standard Manageability Escalation of Privilege 12/1/2017 1:56:09 PM
Intel® Deep Learning Training Tool Beta 1 security vulnerability 11/20/2017 11:28:51 AM
Intel Unite ® App denial of service and information disclosure vulnerability 11/14/2017 2:25:46 PM
Intel® NUC BIOS Security Updates 10/10/2017 1:34:22 PM
Intel AMT® Upgradable to Vulnerable Firmware 9/5/2017 3:04:32 PM
Intel® SSD 540s, Intel® SSD Pro 5400s, Intel® SSD E 5400s, and Intel® SSD DC S3100 data corruption vulnerability 8/8/2017 1:42:59 PM
Intel® SSD Pro 6000p Series data corruption vulnerability 8/8/2017 1:41:26 PM
Denial of Service in Kernel in multiple versions of the Intel Graphics Driver allows local attacker to perform a Denial of Service via an Out of Bounds Read 8/1/2017 11:31:23 AM
SGX Update 7/25/2017 9:53:12 AM
Intel® AMT Clickjacking Vulnerability 6/5/2017 2:48:06 PM
Intel® Solid State Drive Toolbox™ Escalation of Privilege Vulnerability 5/30/2017 1:07:38 PM
Intel® Branded NUC’s Vulnerable to SMM exploit 5/2/2017 10:04:55 AM
Intel® Hardware Accelerated Execution Manager Driver Privilege Escalation Vulnerability 4/3/2017 2:30:41 PM
Intel® NUC and Intel® Compute Stick DCI Disable 4/3/2017 9:48:49 AM
Intel® QuickAssist Technology RSA-CRT Vulnerability 3/7/2017 8:39:31 AM
Intel PSET Application Install wrapper contains an escalation of privilege vulnerability. 2/28/2017 2:14:19 PM
Intel® Ethernet Controller X710/XL710 Driver Security Vulnerability 2/27/2017 9:01:41 AM
Vulnerability in Intel® RealSense™ Web Component allows authenticated users to elevate privileges via updater subsystem 2/7/2017 2:15:49 PM
Intel® Ethernet Controller X710/XL710 NVM Security Vulnerability 1/9/2017 11:20:54 AM
Multiple Intel Software Products impacted by CVE-2016-2108 12/12/2016 9:52:47 AM
Intel® PROSet/Wireless Software Denial of Service 12/7/2016 10:42:39 AM
Intel® Wireless Bluetooth® Driver Unquoted Service Path 12/6/2016 9:09:54 AM
Intel® Branded NUC’s Vulnerable to SMM Exploit 11/29/2016 9:50:36 AM
Stack overflow vulnerability in Wind River VxWorks 11/1/2016 1:22:52 PM
Vulnerability in Intel SSD Toolbox allows authenticated users to elevate privileges via updater subsystem 10/4/2016 9:36:05 PM
A vulnerability in Intel Integrated Performance Primitives (IPP) Cryptography allows local users to recover the RSA private key via a potential side-channel. 10/4/2016 9:34:50 PM
SmmRuntime Escalation of Privilege 9/30/2016 8:34:27 PM
Multiple Intel Software Products impacted by CVE-2016-4300 9/13/2016 4:29:03 PM
Multiple Potential Vulnerabilities in the Intel® Graphics Driver for Microsoft Windows 8/31/2016 9:24:14 PM
Certain Intel® SATA Solid State Drives Impacted by ATA Drive Password Vulnerability 8/1/2016 8:30:37 PM
Vulnerability impacting the Intel® Solid-State Drive 540s Series, Intel® Solid State Drive E 5400s Series and Intel® Solid State Drive DC S3100 Series drives 8/1/2016 8:14:32 PM
Potential vulnerability in the Intel® Ethernet Controller X710 and XL710 product families 5/31/2016 5:41:08 PM
Multiple Intel Software Products and Services impacted by CVE-2015-7547 5/26/2016 7:00:56 PM
Potential vulnerability in the Intel® Ethernet diagnostics driver for Windows® 5/6/2016 5:54:55 PM
Potential vulnerability in Intel® SSD Data Center Family for SATA 3/15/2016 5:26:56 PM
Potential vulnerability in the Intel® Driver Update Utility 1/19/2016 8:56:37 PM
Potential vulnerability of Intel® SSD 750 Series and Intel® SSD DC P3500 Series 11/17/2015 9:40:56 PM
Local APIC Elevation of Privilege 9/3/2015 9:35:45 PM
Configuration Bypass During S3 Resume 8/13/2015 4:42:06 PM
Potential Vulnerability with Intel® LAN Products with SR-IOV 8/12/2015 6:56:05 AM
Potential vulnerability in Intel® SSD Pro 1500 Series (Opal ready SKU) 7/13/2015 3:58:40 PM
Enhanced Protection of UEFI Variables 4/3/2015 12:22:05 AM
Privilege Elevation Issue Affecting Some Intel® Solid-State Drive Data Center Family for PCIe Products 2/9/2015 10:11:31 PM
BIOS Security Updates for Multiple Issues 1/7/2015 8:39:16 PM
ASLR bypass issue affecting multiple Intel® Software Development Products 11/3/2014 9:45:27 PM
Multiple Security Issues with Intel® Manycore Platform Software Stack (Intel® MPSS) release 3.x 8/26/2014 9:32:17 PM
Multiple Intel Software Products and API Services impacted by CVE-2014-0160 4/30/2014 6:16:45 AM
Intel® Manycore Platform Software Stack Privilege Escalation 3/31/2014 8:58:06 PM
SINIT Authenticated Code Module Privilege Escalation 7/1/2013 10:12:45 PM
Potential for Signature Integrity Compromise and HMAC secret recovery in Intel® Integrated Performance Primitives (Intel® IPP) Cryptography Domain 10/29/2012 10:53:09 PM
Potential for signature integrity compromise in Intel® Integrated Performance Primitives (Intel® IPP) Cryptography Domain 9/11/2012 10:20:13 PM
Privilege Escalation in Intel® Hybrid Cloud (IHC) 7/19/2012 10:13:10 PM
Low Entropy RSA Issue in Intel EPSD Baseboard Management Controller (BMC) Firmware 7/3/2012 7:00:00 AM
SINIT Buffer Overflow Vulnerability 12/6/2011 8:00:00 AM
Intel® Active System Console v4.4 and Intel® Multi-Server Manager v1.0 Denial of Service 8/8/2011 7:00:00 AM
Intel® Ethernet 82598 and 82599 10 Gigabit Ethernet Controller Denial of Service. 5/18/2011 7:00:00 AM
Intel® C++ Compiler and Intel® Fortran Compiler Insecure File Permission Local Privilege Escalation Vulnerability 12/20/2010 8:00:00 AM
Intel®Xeon® 5500, 5600 Series Baseboard Management Component (BMC) Firmware Privilege Escalation 11/1/2010 7:00:00 AM
Intel® Math Kernel Library Insecure File Permission Local Privilege Escalation 7/23/2010 7:00:00 AM
OpenSSL* vulnerability – Software Development Tools for Intel® Active Management Technology (Intel® AMT) 7/20/2010 7:00:00 AM
Intel® Active Management Technology Software Development Kit Remote Code Execution 3/29/2010 7:00:00 AM
Intel® Desktop Boards Privilege Escalation 2/16/2010 8:00:00 AM
SINIT misconfiguration allows for Privilege Escalation 12/21/2009 8:00:00 AM
Intel® Desktop Board Buffer Overflow Local Privilege Escalation 10/30/2009 7:00:00 AM
New BIOS available for Intel® Desktop Board products BIOS to prevent unauthorized downgrading to a previous BIOS version. 10/16/2009 7:00:00 AM
Intel® Desktop and Intel® Server Boards Privilege Escalation 10/5/2009 7:00:00 AM
Intel Keyboard Buffer Information Disclosure Vulnerability 8/25/2008 7:00:00 AM
Intel® Desktop and Intel® Mobile Boards Privilege Escalation 8/25/2008 7:00:00 AM
Intel® LAN Driver Buffer Overflow Local Privilege Escalation 1/24/2008 8:00:00 AM
Intel® Enterprise Southbridge 2 Baseboard Management Controller Denial of Service 1/19/2007 8:00:00 AM
Intel® Centrino Wireless Driver Malformed Frame Privilege Escalation 1/12/2007 8:00:00 AM
Intel® Centrino Wireless Driver Malformed Frame Remote Code Execution 1/12/2007 8:00:00 AM
Intel® PROSet/Wireless Software Local Information Disclosure 1/12/2007 8:00:00 AM

Reporting a security issue

If you have information about a security issue or vulnerability with an Intel product, please send an e-mail to secure@intel.com. Encrypt sensitive information using our PGP public key.

For issues related to Intel managed open source projects, please visit http://www.01.org/security.

Please provide as much information as possible, including:

  • The products and versions affected
  • Detailed description of the vulnerability
  • Information on known exploits

  • A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:

  • Vulnerability handling guidelines

  • Need product support?
    The secure@intel.com e-mail address should only be used for reporting security issues.

    If you...
  • Have questions about the security features of an Intel product
  • Require technical support
  • Want product updates or patches

  • Please visit Support & Downloads.