The current CPU processor is extremely complex, with dozens or even tens of billions of transistors inside, and some problems are inevitable. The ghost and fuse of 2018 left Intel scratching its head, after all, they were the world’s largest CPU vendors. These CPU vulnerabilities are commonly referred to as Common Vulnerability and Exposure, or CVE, but different CVs have different security impacts and are rarely affected by security.
Intel recently released its 2019 CPU security report, which reveals four of its security technologies, including program isolation, virtual machine and container isolation, full memory encryption, and platform firmware protection/repair.
Intel also shared some small knowledge of CVE vulnerabilities, such as 236 CVE vulnerabilities found in 2019, but half of cVE hazards are only medium, high-risk levels are only 81, and only four are serious.
Of these vulnerabilities, 61% of The CVE vulnerabilities were actually discovered within Intel, with 61% of the high-risk vulnerabilities and 76% of the serious high-risk vulnerabilities discovered by the Intel team.
Of the 76 vulnerabilities exposed externally, 76% were actually found by Intel’s bounty program.
That puts the proportion of CVE vulnerabilities actually discovered by outside independent teams.
What’s more, although there are 236 CVE vulnerabilities, but not CVE vulnerabilities related to CPU hardware, of which 112 are software vulnerabilities, 59 are related to firmware, and 52 are related to software, firmware.