Intel has announced that it will be addressing 77 security vulnerabilities this month. According to the blue team, 67 of the 77 vulnerabilities were internally found by them.
As Intel stated:
“We believe that assigning CVE ID’s and publicly documenting internally found vulnerabilities helps our customers to accurately assess risk, prioritize, and deploy updates. By the time you are reading this blog post, mitigations for many of these issues will have already been propagated throughout the ecosystem through the IPU process. At the same time, the external researchers who reported the remaining issues to us have all been good partners in working with us on coordinated vulnerability disclosure (CVD).”
Intel recommends users to check with their system manufacturers and operating system vendors to determine how to obtain these updates.
You can find more details about these security vulnerabilities here.
Intel concluded that it continuously improves the techniques available to address such issues and appreciate the academic researchers who have partnered with them.
Kudos to our reader “Metal Messiah” for bringing this to our attention!

John is the founder and Editor in Chief at DSOGaming. He is a PC gaming fan and highly supports the modding and indie communities. Before creating DSOGaming, John worked on numerous gaming websites. While he is a die-hard PC gamer, his gaming roots can be found on consoles. John loved – and still does – the 16-bit consoles, and considers SNES to be one of the best consoles. Still, the PC platform won him over consoles. That was mainly due to 3DFX and its iconic dedicated 3D accelerator graphics card, Voodoo 2. John has also written a higher degree thesis on the “The Evolution of PC graphics cards.”
Contact: Email
only 77 security vulnerabilities ?
Hey, this article is actually mising this most important part of info. ?
The main Focus is one a specific vulnerability called as “JCC Erratum”. This vulnerability impacts most of Intel’s recently released processors, including Coffee Lake, Amber Lake, Cascade Lake, Skylake, Whiskey lake, Comet Lake and Kaby Lake.
This bug relates to Intel’s ICache/ Decodes Streaming buffer, though this issue can be somehow addressed with firmware.
However, Intel’s mitigations document for Jump Conditional Code Erratum state that this mitigation/workaround will impact performance by 0-4% excluding outliers, which means that even HIGHER performance downsides in specific workloads.
One TECH website benchmarked some Intel’s processors both with and without their JCC Erratum mitigations, finding notable performance hits in some software.
Unlike some of Intel’s other mitigations, the fixes for JCC Erratum can impact pure CONSUMER workloads, which means that this update will impact more general PC users than Intel’s previous software mitigations (inclduing GAMING/Home rigs).
This seems to be the bottom line. ??
INTEL’s CPU acrhitecture is highly vulnerable to other atttacks as well, both known, and those which are going to be discovered in near future, unlike AMD’s Architecture.
..
as always, thanks MM for your input….
This corporation has been prioritizing performance over security for decades.
yeah! since first Pentium )