Camping with Tigers
This exclusive event invited a select group of security researchers to hunt vulnerabilities in the 11th Gen Intel® Core™ vPro® platform. The six-month event included two months of training and three cycles of finding vulnerabilities, each receiving a multiplier to Intel Bug Bounty’s standard bounty amounts.
Congratulations to Our Top Bug Hunters!
First to Submit:
Z-Wink
Highest Single Payout:
Mickey (@HackingThings)
Most Eligible Reports:
Alex Matrosov
Widest Impact:
Alex Matrosov
Helping Others:
Mickey (@HackingThings)
Just in Time:
Dan Lutas
In Scope:
Participants should focus efforts on Intel branded components included in the provided device. Potential findings might involve any of the following:
- Micro-architectural attacks
- Firmware attacks like microcode
- Platform configuration (Intel® vPro, Intel® Management Engine, etc.)
- Platform design
- Physical attacks (note that this is a deviation from our existing Bug Bounty policy)
- Firmware attacks
- Physical: I/O, storage, flash, memory, sensors, embedded controller, trusted platform module
- Firmware: BIOS, IP firmware components, embedded controller, sensor, trusted platform module, storage, flash storage
- Device drivers shipped with the device (such as Intel graphics drivers, Thunderbolt device drivers, Bluetooth device drivers, wireless drivers, ethernet drivers, chipset driver)
Note: Any findings that are in User Space (Ring 3) are ineligible for the multiplier.