In its disclosure note, Intel gave the four bugs a severity rating of "medium" and said they had been first discovered by its own researchers and independently reported to the company by external researchers.
Processors made by AMD and ARM are not affected by these vulnerabilities. The four bugs have been named ZombieLoad, RIDL, Fallout and Store-To-Leak Forwarding.
Collectively called Microarchitectural Data Sampling, Intel said of the bugs: "Under certain conditions, MDS provides a program the potential means to read data that program otherwise would not be able to see.
"MDS techniques are based on a sampling of data leaked from small structures within the CPU using a locally executed speculative execution side channel.
"Practical exploitation of MDS is a very complex undertaking. MDS does not, by itself, provide an attacker with a way to choose the data that is leaked."
Last year, a number of vulnerabilities exploiting speculative execution, where processors attempt to anticipate and execute instructions, were also disclosed. Two of them became very well-known; they had the names Meltdown and Spectre.
Intel said MDS was addressed in hardware beginning with select 8th and 9th Generation Intel Core processors, as well as the 2nd Generation Intel Xeon Scalable processor family.
All future Intel processors would include hardware mitigations addressing these vulnerabilities, it said.
The company said for products where MDS was not addressed in hardware, it was releasing processor microcode updates as part of its regular update process with its OEMs.
A rundown of the impact on performance when these updates were applied was provided.
Commenting on the new vulnerabilities, Kevin Bocek, vice-president, Security Strategy and Threat Intelligence at cyber security company Venafi, said: "These vulnerabilities represent a scary reality that’s actually been around for a quite a while. Cyber attackers are exploiting the identities of machines to obtain sensitive data.
"Code signing keys, TLS digital certificates, SSH keys are all incredibly valuable targets and chip vulnerabilities make it possible for attackers to make off with these critical security assets when running on nearby cloud and virtual machines."
Bocek said it appeared that some security professionals had forgotten about Heartbleed, but this vulnerability proved that similar attacks should be expected in the future.
"Security teams need to accept that they won’t be able to avoid vulnerabilities like ZombieLoad; instead they need to focus on protecting the keys and certificates attackers are targeting," he said.
"Responding to chip vulnerabilities successfully requires complete visibility of where all keys and certificates are located, intelligence on how they are being used and the automation to replace them in seconds… not days or weeks. Consider ZombieLoad, and other chip vulnerabilities, a dress rehearsal for the day quantum computing breaks all machine identities.“