Intel has paid out more than $4.1 million through its bug bounty program since its creation in 2017, according to a product security report published by the chip giant on Wednesday.
Between 2018 and 2021, Intel paid out, on average, $800,000 through its bug bounty program each year for vulnerabilities discovered in the company’s products. In 2022, it awarded $935,000.
Intel says a total of 243 vulnerabilities were reported in 2022, roughly the same as in the previous three years. More than half of the 2022 vulnerabilities were found internally by the company and 90 security flaws, representing 37% of the total, were reported via its bug bounty program.
The company engaged 151 researchers last year, more than double compared to the previous three years.
Most of the vulnerabilities were discovered in Intel software, processors, and network communications products. Only two issues were assigned a ‘critical’ severity rating, but 79 were classified as having ‘high’ severity.
Intel has helped create a hardware common weakness enumeration (CWE) list and 19 of the hardware vulnerabilities addressed last year were assigned to 13 hardware CWEs.

“To deliver security at scale, we have over 500 dedicated product security staff, perform over 120 hackathons per year, fund 40+ academic research teams, and continue to expand our Bug Bounty programs in innovative ways,” Intel said.
The Intel Product Security Report details several of the company’s cybersecurity initiatives.
Related: Dozens of Vulnerabilities Patched in Intel Products
Related: Intel Confirms UEFI Source Code Leak as Security Experts Raise Concerns
Related: Intel Patches Severe Vulnerabilities in Firmware, Management Software

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
Latest News
- Italy Temporarily Blocks ChatGPT Over Privacy Concerns
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Report: Chinese State-Sponsored Hacking Group Highly Active
- Votiro Raises $11.5 Million to Prevent File-Borne Threats
- Lumen Technologies Hit by Two Cyberattacks
- Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution
