7.8

CVE-2023-22355

Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.0.251 may allow an authenticated user to potentially enable escalation of privilege via local access.

Data is provided by the National Vulnerability Database (NVD)
IntelAdvisor SwPlatformoneapi Version < 2023.0
IntelCpu Runtime SwPlatformopencl Version < 2023.0
IntelDistribution For Python Version < 2023.0
IntelDpc++ Compatibility Tool Version < 2023.0
IntelFortran Compiler Version < 2023.0
IntelInspector SwPlatformoneapi Version < 2023.0
IntelMpi Library Version < 2021.8
IntelOneapi Base Toolkit Version < 2023.0
IntelOneapi Data Analytics Library Version < 2023.0
IntelOneapi Dpc++/c++ Compiler Version < 2023.0
IntelOneapi Dpc++ Library Version < 2022.0
IntelOneapi Hpc Toolkit Version < 2023.0.0
IntelOneapi Hpc Toolkit Version2023.0.0
IntelOneapi Iot Toolkit Version < 2023.0
IntelOneapi Math Kernel Library Version < 2023.0
IntelOneapi Rendering Toolkit Version < 2023.0
IntelOpen Image Denoise Version < 1.4.3
IntelOpen Volume Kernel Library Version < 2023.0
IntelOspray Version < 2023.0
IntelOspray Studio Version < 2023.0
IntelTrace Analyzer And Collector Version < 2021.8.0
IntelVtune Profiler Version < 2023.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.214
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
secure@intel.com 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CWE-427 Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.