Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Software Security Guidance

This information is designed for developers and systems experts looking to understand potential vulnerabilities and assess risk, with resources and recommendations for building more secure solutions.

 

  • Overview
  • Advisory Guidance
  • Best Practices
  • Disclosure Documentation
  • Feature Documentation
  • More Information
  • Affected Processors

Advisory Guidance

Overviews and one-page descriptions of security advisories along with recommended mitigations for affected environments.

Find industry-wide severity ratings in the National Vulnerability Database.

  Critical

  High

  Medium

  Low

CVSS Title CVE SA Technical Documentation (If Applicable) Disclosure Date
5.6 Indirect Branch Predictor Delayed Updates CVE-2024-45332 INTEL-SA-01247 n/a 2025-05-13
4.7 Indirect Target Selection CVE-2024-28956 INTEL-SA-01153 n/a 2025-05-12
8.8 Subpage Permission

CVE-2024-36242
CVE-2024-38660

INTEL-SA-01196 n/a 2024-11-12
7.5

Intel® Data Streaming Accelerator (Intel® DSA) and Intel® In-Memory Analytics Accelerator (Intel® IAA) Error Reporting

CVE-2024-21823

INTEL-SA-01084

n/a

2024-05-14
6.5 Register File Data Sampling CVE-2023-28746 INTEL-SA-00898 n/a 2024-03-12
6.1 Trusted Execution Configuration Register Access CVE-2023-23583 INTEL-SA-00960 n/a 2024-03-12
8.8 Redundant Prefix Issue CVE-2023-23583 INTEL-SA-00950 n/a 2023-11-14
6.5 Gather Data Sampling CVE-2022-40982 INTEL-SA-00828 Gather Data Sampling 2023-08-08
6.0 Stale Data Read from Legacy xAPIC CVE-2022-21233 INTEL-SA-00657 n/a

2022-08-09

5.5 Post-Barrier Return Stack Buffer Predictions CVE-2022-26373 INTEL-SA-00706 n/a

2022-08-09

4.7 Return Stack Buffer Underflow CVE-2022-28693
CVE-2022-29901
INTEL-SA-00702 n/a

2022-07-12

6.1 Processor Memory-Mapped I/O (MMIO) Stale Data Vulnerabilities CVE-2022-21123
CVE-2022-21125
CVE-2022-21127
CVE-2022-21166
INTEL-SA-00615 Processor MMIO Stale Data Vulnerabilities 2022-06-14
5.5 Undefined MMIO Hang CVE-2022-21180 INTEL-SA-00645 n/a 2022-06-14
2.5 Speculative Load Disordering CVE-2021-33149 n/a n/a 2022-05-10
4.7 Branch History Injection CVE-2022-0001 INTEL-SA-00598 Branch History Injection 2022-03-08
6.5 Floating Point Value Injection CVE-2021-0086 INTEL-SA-00516 n/a 2021-06-08
6.5 Speculative Code Store Bypass CVE-2021-0089 INTEL-SA-00516 n/a 2021-06-08
5.6 Running Average Power Limit Energy Reporting CVE-2020-8694, CVE-2020-8695 INTEL-SA-00389 n/a 2020-11-10
6.5 Special Register Buffer Data Sampling CVE-2020-0543 INTEL-SA-00320 Special Register Buffer Data Sampling 2020-06-09
5.6 Snoop-assisted L1 Data Sampling CVE-2020-0550 INTEL-SA-00330 Snoop-assisted L1 Data Sampling 2020-03-10
5.6 Load Value Injection CVE-2020-0551 INTEL-SA-00334 Load Value Injection 2020-03-10
6.5 L1D Eviction Sampling CVE-2020-0549 INTEL-SA-00329 n/a 2020-01-27
2.8 Vector Register Sampling CVE-2020-0548, CVE 2020-8696 INTEL-SA-00329 n/a 2020-01-27
6.5 Intel® Transactional Synchronization Extensions (Intel® TSX) Asynchronous Abort CVE-2019-11135 INTEL-SA-00270 Intel TSX Asynchronous Abort 2019-11-12
6.5 Machine Check Error Avoidance on Page Size Change CVE-2018-12207 INTEL-SA-00210 Machine Check Error Avoidance on Page Size Change 2019-11-12
5.6 Speculative Behavior of SWAPGS and Segment Registers CVE-2019-1125   Speculative Behavior of SWAPGS and Segment Registers 2019-08-06
6.5 Microarchitectural Data Sampling CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091 INTEL-SA-00233 Microarchitectural Data Sampling 2019-05-14
7.3 L1 Terminal Fault CVE-2018-3615, CVE-2018-3620, CVE-2018-3646 INTEL-SA-00161 L1 Terminal Fault 2018-08-14
4.3 Rogue System Register Read CVE-2018-3640 INTEL-SA-00115 n/a 2018-05-21
4.3 Speculative Store Bypass CVE-2018-3639 INTEL-SA-00115 Speculative Execution Side Channel Mitigations 2018-05-21
5.6 Bounds Check Bypass CVE-2017-5753 INTEL-SA-00088 Analyzing Potential Bounds Check Bypass Vulnerabilities 2018-01-03
5.6 Rogue Data Cache Load CVE-2017-5754 INTEL-SA-00088 Introduction to Speculative Execution Side Channel Methods 2018-01-03
5.6 Branch Target Injection CVE-2017-5715 INTEL-SA-00088 Retpoline: A Branch Target Injection Mitigation 2018-01-03
View all Show less

Glossary

FAQ

Contact

Product and Performance Information

1

Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.

2

Features and benefits in Intel® technologies depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at Intel.com.

3

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors.

Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more complete information visit www.intel.com/benchmarks.

Performance results are based on testing as of dates shown in configurations and may not reflect all publicly available updates.

The products and services described may contain defects or errors known as errata which may cause deviations from published specifications. Current characterized errata are available on request.

Intel provides these materials as-is, with no express or implied warranties.

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo