Skip To Main Content
Intel logo - Return to the home page

Sign In

Your username is missing
Your password is missing

By signing in, you agree to our Terms of Service.

Forgot your Intelusername orpassword?

Frequently Asked Questions

Do you work for Intel? Sign in here.

Don’t have an Intel account? Sign up here for a basic account.

My Tools

Select Your Region

Asia Pacific

  • Asia Pacific (English)
  • Australia (English)
  • India (English)
  • Indonesia (Bahasa Indonesia)
  • Japan (日本語)
  • Korea (한국어)
  • Mainland China (简体中文)
  • Taiwan (繁體中文)
  • Thailand (ไทย)
  • Vietnam (Tiếng Việt)

Europe

  • France (Français)
  • Germany (Deutsch)
  • Ireland (English)
  • Italy (Italiano)
  • Poland (Polski)
  • Spain (Español)
  • Turkey (Türkçe)
  • United Kingdom (English)

Latin America

  • Argentina (Español)
  • Brazil (Português)
  • Chile (Español)
  • Colombia (Español)
  • Latin America (Español)
  • Mexico (Español)
  • Peru (Español)

Middle East/Africa

  • Israel (עברית)

North America

  • United States (English)
  • Canada (English)
  • Canada (Français)
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Advanced Security Development Practices
  2. Intel Vulnerability Management Practices
  3. Intel Bug Bounty Program
Introducing 4th Gen Intel® Xeon® Scalable Processors Introducing 4th Gen Intel® Xeon® Scalable Processors
Introducing 4th Gen Intel® Xeon® Scalable Processors

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

 

 

 

 

 

 

Intel Bug Bounty Program

Collaborating with the Research Community

Product security is enhanced with more people looking. We have smart, talented engineers and researchers working internally—and we engage with some of the best and brightest external security researchers and academics across the globe to help us identify and mitigate security vulnerabilities in Intel products.

Our Bug Bounty Program encourages collaboration with the research community and incentivize researchers to report vulnerabilities in Intel products. Through the Bug Bounty program, Intel invites researchers to test specific targets, submit vulnerabilities, and get paid for their work. Intel’s Bug Bounty Program has grown and evolved significantly since launch in 2017, starting with a handful of select security researchers. In 2018, Intel moved to a Bug Bounty program available to all eligible members of the public and has now worked with over 250 researchers worldwide. In 2020, 105 of the 231 Common Vulnerabilities and Exposures (CVEs) Intel addressed were reported through the Bug Bounty program.

As with similar industry programs, the Intel Bug Bounty program is part of our broader Product Security Incident Response Team (PSIRT) program supporting our Coordinated Vulnerability Disclosure (CVD) process.

Reporting a Security Vulnerability

If you believe you've found a security vulnerability in an Intel product or solution, we encourage you to notify us through our Bug Bounty Program and work with us to mitigate and to coordinate disclosure of the vulnerability.

Watch this video, So You Found a Vulnerability, to find out what you can expect when participating in Intel’s Bug Bounty program.

Learn more

Bug Bounty Process

Each security bug report is individually evaluated based on technical details to determine severity and next steps.

  • Assessment: PSIRT ensures that all requested information has been provided for Triage.  See the Reporting a Vulnerability page for a list of required information.
  • Triage: A team of Intel product engineers and security experts determines if a vulnerability is valid and an eligible Intel product or technology is impacted.
  • Vulnerability severity determination: PSIRT works with product security engineers and security experts to determine the severity and impact of a vulnerability.   

Awards range from $500 up to $100,000, based on quality of the report, impact of a potential vulnerability, severity, delivery and quality of a proof of concept, and type of vulnerability.

Bug Bounty Eligibility

The program covers eligible Intel branded products and technologies maintained and distributed by Intel.

For full details, see the full list of Intel® Bug Bounty Program Terms.

Incentive Programs

Intel added a bonus incentive to focus on firmware and hardware within some Pentium®, Celeron®, and Intel Atom® processors. 

Learn more
 

More Information

Intel PSIRT Mission

Vulnerability Handling Processes

Intel Product Security Center

Industry Group Engagement

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo