Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Region

Asia Pacific

  • Asia Pacific (English)
  • Australia (English)
  • India (English)
  • Indonesia (Bahasa Indonesia)
  • Japan (日本語)
  • Korea (한국어)
  • Mainland China (简体中文)
  • Taiwan (繁體中文)
  • Thailand (ไทย)
  • Vietnam (Tiếng Việt)

Europe

  • France (Français)
  • Germany (Deutsch)
  • Ireland (English)
  • Italy (Italiano)
  • Poland (Polski)
  • Spain (Español)
  • Turkey (Türkçe)
  • United Kingdom (English)

Latin America

  • Argentina (Español)
  • Brazil (Português)
  • Chile (Español)
  • Colombia (Español)
  • Latin America (Español)
  • Mexico (Español)
  • Peru (Español)

Middle East/Africa

  • Israel (עברית)

North America

  • United States (English)
  • Canada (English)
  • Canada (Français)
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Software Security Guidance

This information is designed for developers and systems experts looking to understand potential vulnerabilities and assess risk, with resources and recommendations for building more secure solutions.

  • Overview
  • Advisory Guidance
  • Best Practices
  • Disclosure Documentation
  • Feature Documentation
  • More Information
  • Affected Processors

Your Source for Software and Hardware Security Information

Explore in-depth guidance related to the latest security vulnerabilities, as well as the Intel security features and best practices designed to help protect systems and code from those vulnerabilities. This information helps enable developers and system administrators to better understand how software and hardware can work together to create more secure computing environments in an evolving security landscape.

Learn More about Intel’s Security Guidance

Featured Security Guidance

View All
CVSS  Issue Overview CVE INTEL-SA Disclosure Date Technical Documentation (If Applicable)
  6.0 Stale Data Read from Legacy xAPIC CVE-2022-21233
CVE-2022-38090
INTEL-SA-00657
INTEL-SA-00767
2022-08-09 n/a
  5.5

 

Post-Barrier Return Stack Buffer Predictions

CVE-2022-26373 INTEL-SA-00706 2022-08-09 n/a
 4.7 Return Stack Buffer Underflow CVE-2022-28693
CVE-2022-29901
INTEL-SA-00702
INTEL-SA-00707
2022-07-12 n/a
 6.1 Processor MMIO Stale Data Vulnerabilities CVE-2022-21123
CVE-2022-21125
CVE-2022-21127
CVE-2022-21166
INTEL-SA-00615 2022-06-14 Processor MMIO Stale Data Vulnerabilities
 4.7

Branch History Injection

CVE-2022-0001

INTEL-SA-00598

2022-03-08

Branch History Injection
View all Show less

Check Affected Processors

Evaluate the impact of transient execution attacks from 2018 through today on Intel® CPUs to determine the recommended way to stay protected from potential attacks.

View Full Table


Proactively Secure Software for Intel® Processors

To develop for system security and performance, developers must understand how software works with hardware. To balance both priorities:

  • Adhere to security best practices and secure coding principles as a first line of defense.
  • Download the latest microcode and follow recommended mitigation guidance for known issues.
  • Learn Intel hardware behavior and how software can best use that behavior and associated features.

The following documents show how to develop and secure software running on Intel processors, as well as details and options for fine-tuned control of software and hardware features according to the most up-to-date guidance.

Latest Feature Documentation

Learn more about how to optimize your software using Intel's security features, platform controls, and performance enhancements. Always keep your systems up-to-date to ensure access to the latest features.

Data-Dependent Prefetcher

Some newer Intel processors support a new hardware prefetcher feature classified as a Data-Dependent Prefetcher (DDP), which exhibits properties designed to restrict side channel attacks.

Frequency Throttling Side Channel Software Guidance for Cryptography Implementations

For developers implementing cryptographic algorithms, to mitigate timing side channels due to cycle differences, Intel recommends selecting instructions whose execution time is data-independent.

Fast Store Forwarding Predictor

Learn about the Fast Store Forwarding Predictor performance feature and how its properties can be used to help prevent potential exploitation of transient execution disclosure gadgets.

Frequent References

Find guidance for common questions when assessing risk.

  • Intel's Research on Disclosure Gadgets at Indirect Branch Targets in the Linux* Kernel
  • Get Microcode Update Guidance
  • Spectre and Meltdown Checker Script
  • Refined Speculative Execution Terminology

Security Information

Learn more about Intel's commitment to security.

  • Intel Security Newsroom
  • Security Center
  • Intel® Bug Bounty Program

Vulnerability Management at Intel

Intel has sophisticated systems to address security vulnerabilities in Intel products, led by the Product Security & Incident Response Team (PSIRT). Learn more about vulnerability handling and disclosure processes.

  • PSIRT Mission
  • Vulnerability Handling Processes

Report a Security Vulnerability

If you believe you've found a security vulnerability in an Intel product or solution, notify us through the Intel Bug Bounty Program, and work with Intel to mitigate and coordinate disclosure of the vulnerability.

Learn More

So You Found a Vulnerability

Watch this video to find out what you can expect when participating in the Intel Bug Bounty Program.

Glossary

FAQ

Contact

Product and Performance Information

1

Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.

2

Features and benefits in Intel® technologies depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at Intel.com.

3

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors.

Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more complete information visit www.intel.com/benchmarks.

Performance results are based on testing as of dates shown in configurations and may not reflect all publicly available updates.

The products and services described may contain defects or errors known as errata which may cause deviations from published specifications. Current characterized errata are available on request.

Intel provides these materials as-is, with no express or implied warranties.

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information
  • Recycling

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo