Collaborating with the Research Community
Product security is enhanced with more people looking. We have smart, talented engineers and researchers working internally—and we engage with some of the best and brightest external security researchers and academics across the globe to help us identify and mitigate security vulnerabilities in Intel products.
Our Bug Bounty Program encourages collaboration with the research community and incentivize researchers to report vulnerabilities in Intel products. Through the Bug Bounty program, Intel invites researchers to test specific targets, submit vulnerabilities, and get paid for their work. Intel’s Bug Bounty Program has grown and evolved significantly since launch in 2017, starting with a handful of select security researchers. In 2018, Intel moved to a Bug Bounty program available to all eligible members of the public and has now worked with over 250 researchers worldwide. In 2020, 105 of the 231 Common Vulnerabilities and Exposures (CVEs) Intel addressed were reported through the Bug Bounty program.
As with similar industry programs, the Intel Bug Bounty program is part of our broader Product Security Incident Response Team (PSIRT) program supporting our Coordinated Vulnerability Disclosure (CVD) process.