The latest security information on Intel® products.
Submitted Research
Intel thanks the following for their security research on Intel products and technologies. The findings identified did not introduce new vulnerabilities in Intel products and do not require additional mitigations.
| Title | Authors | Focus Area | Intel Response |
|---|---|---|---|
| HEAP LOCALIZATION: Cache Side-Channel based Linux Kernel Heap Exploit Techniques | Yoochan Lee, Thorsten Holz Max Planck Institute for Security and Privacy Sihyun Roh, Byoungyoung Lee Seoul National University Hyuk Kwon Theori, Inc. |
CPU / Microarchitecture | Intel guidance |
| TDXRay: Microarchitectural Side-Channel Analysis of Intel TDX for Real-World Workloads | Tristan Hornetz, Hosein Yavarzadeh, Albert Cheu, Adria Gascon, Lukas Gerlach, Daniel Moghimi, Phillipp Schoppmann, Michael Schwarz, Ruiyi Zhang | TEE / Confidential Computing |
Intel security bulletin
|
| TREVEX: A Black-Box Detection Framework For Generic Transient Execution Vulnerabilities | Daniel Weber, Fabian Thomas, Leon Trampert, Ruiyi Zhang, Michael Schwarz CISPA Helmholtz Center for Information Security |
CPU / Microarchitecture |
Intel guidance |
Intel® Product Security Center Advisories
Intel is focused on ensuring the security of our customers computing environments. We are committed to rapidly addressing issues as they arise, and providing recommendations through security advisories and security notices.
Security advisories are fixes or workarounds for vulnerabilities identified with Intel products.
Report a Vulnerability
If you have information about a security issue or vulnerability affecting an Intel branded product or technology, submit your report via the Intigriti platform, where you'll find eligibility criteria and submission instructions. All vulnerability reports must be submitted through Intigriti.
For issues not related to reporting security vulnerabilities, contact Intel PSIRT.
For issues related to Intel's external web presence (Intel.com and related subdomains), please contact Intel's External Security Research team.
Intel® Bug Bounty Program
Intel Corporation believes that working with skilled security researchers across the globe is a crucial part of identifying and mitigating security vulnerabilities in Intel products. Like other major technology companies, Intel incentivizes security researchers to report security vulnerabilities in Intel products to us to enable a coordinated response.
To encourage closer collaboration with the security research community on these kinds of issues, Intel created its Bug Bounty Program. The program provides a structured process for security researchers to collaborate with Intel on identifying and mitigating potential security vulnerabilities, coordinating responsible disclosure, and receiving recognition for contributions.
Working with Intigriti as our provider helps ensure independent oversight, consistent report management, and compliance with regulatory commitments.
Intel® Bug Bounty Program Terms
Need product support?
If you...
- Have questions about the security features of an Intel product
- Require technical support
- Want product updates or patches
Please visit Support & Downloads.