The latest security information on Intel® products.
Intel® Product Security Bulletins
Intel is focused on ensuring the security of our customers computing environments. We are committed to rapidly addressing issues as they arise, and providing recommendations through security advisories and security bulletins.
| Bulletins | Bulletin Number | Updated |
|---|---|---|
| TDXRay | 2026-04-02-001 | April 02, 2026 |
| TEE.fail | 2025-10-28-001 | October 28, 2025 |
| VMSCAPE | 2025-09-11-001 | September 11, 2025 |
| MCHammer | 2025-08-06-001 | August 6, 2025 |
| TPM 2.0 | 2025-06-10-001 | June 10, 2025 |
| Branch Privilege Injection | 2025-05-13-001 | May 13, 2025 |
| Libexpat | 2025-04-15-001 | April 15, 2025 |
| Fuse Encryption Key | 2025-04-03-001 | April 4, 2025 |
| GhostRace | 2024-11-04-001 | November 4, 2024 |
| TDXDown | 2024-10-08-001 | October 8, 2024 |
| SGXkeydisclosureclaim | 2024-08-29-001 | August 29, 2024 |
| Sinkclose | 2024-08-14-001 | August 20, 2024 |
| PKFail | 2024-07-25-001 | July 25, 2024 |
| regreSSHion | 2024-07-10-001 | July 10, 2024 |
| Indirector | 2024-07-02-001 | July 3, 2024 |
| Pathfinder | 2024-04-26-001 | April 26, 2024 |
| Lighttpd | 2024-04-17.001 | April 17, 2024 |
| Inspectre Gadget | 2024-04-09.001 | April 9, 2024 |
| Ahoi Attacks | 2024-04-08.001 | April 8, 2024 |
| LogoFail Vulnerabilities | 2023-12-06.001 | December 6, 2023 |
| OpenSSL Vulnerabilities | 2022-12-09.001 | December 9, 2022 |
| Trojan Source attacks | 2022-08-25.001 | August 25, 2022 |
| Apache Log4j2 Vulnerabilities | 2021-12-14.001 | December 14, 2021 |
Intel® Product Security Center Advisories
Intel is focused on ensuring the security of our customers computing environments. We are committed to rapidly addressing issues as they arise, and providing recommendations through security advisories and security notices.
Security advisories are fixes or workarounds for vulnerabilities identified with Intel products.
Report a Vulnerability
If you have information about a security issue or vulnerability affecting an Intel branded product or technology, submit submit your report via the Intigriti platform, where you'll find eligibility criteria and submission instructions. All vulnerability reports must be submitted through Intigriti.
For issues not related to reporting security vulnerabilities, contact Intel PSIRT.
For issues related to Intel's external web presence (Intel.com and related subdomains), please contact Intel's External Security Research team.
Intel® Bug Bounty Program
Intel Corporation believes that working with skilled security researchers across the globe is a crucial part of identifying and mitigating security vulnerabilities in Intel products. Like other major technology companies, Intel incentivizes security researchers to report security vulnerabilities in Intel products to us to enable a coordinated response.
To encourage closer collaboration with the security research community on these kinds of issues, Intel created its Bug Bounty Program. The program provides a structured process for security researchers to collaborate with Intel on identifying and mitigating potential security vulnerabilities, coordinating responsible disclosure, and receiving recognition for contributions.
Working with Intigriti as our provider helps ensure independent oversight, consistent report management, and compliance with regulatory commitments.
Intel® Bug Bounty Program Terms
Need product support?
If you...
- Have questions about the security features of an Intel product
- Require technical support
- Want product updates or patches
Please visit Support & Downloads.