Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Coordinated Vulnerability Disclosure

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

 

 

Coordinated Vulnerability Disclosure

Coordinated Reporting to Minimize Impact

Our security assurance practices adhere to industry best practices for Coordinated Vulnerability Disclosure (CVD). CVD is a process for reducing adversary advantage while a security vulnerability is being mitigated. Intel and much of the tech industry follow a form of CVD, under which a cybersecurity vulnerability is publicly disclosed only after mitigations are available. 

CVD pertains to the processes and methods by which vulnerabilities are shared and disclosed. At times, the final date for publication of a Security Advisory may require coordination and collaboration with industry groups, external security researchers, and/or business partners.

We disclose information about security vulnerabilities to stakeholders who can best help us mitigate the vulnerabilities as quickly as possible. We may engage with different stakeholders at different stages throughout the coordinated disclosure process. Intel selects appropriate stakeholders by evaluating applicable factors, such as their capabilities to aid with one or more of the following: 

  • Analyze and test security vulnerability claims
  • Identify needed mitigation and develop such mitigation 
  • Test and improve mitigation
  • Deploy and communicate mitigation

The CVD process helps build a trusted foundation for computing through collaboration with researchers that allows companies to develop mitigations and share findings. The cumulative benefits are broader industry resilience to common weaknesses, more secure products, and heightened public awareness and confidence.

Resources

CERT Guide to Coordinated Vulnerability Disclosure

VIDEO: So You Found a Vulnerability

2021 Intel Product Security Report

More Information

Intel PSIRT Mission

Vulnerability Handling Processes

Intel Bug Bounty Program

Secure Development Practices Overview

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo