6.8
CVE-2023-27383
- EPSS 0.07%
- Published 14.11.2023 19:15:20
- Last modified 21.11.2024 07:52:47
- Source secure@intel.com
- Teams watchlist Login
- Open Login
Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access.
Data is provided by the National Vulnerability Database (NVD)
Intel ≫ Mpi Library Version < 2021.9
Intel ≫ Oneapi Base Toolkit Version < 2023.1
Intel ≫ Oneapi Hpc Toolkit Version < 2023.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.224 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 0.9 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
secure@intel.com | 6.8 | 0.9 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-693 Protection Mechanism Failure
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.