7.3

CVE-2023-28823

Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow an authenticated user to potentially enable escalation of privilege via local access.

Data is provided by the National Vulnerability Database (NVD)
IntelAdvisor For Oneapi Version < 2023.1
IntelDpc++ Compatibility Tool Version < 2023.1
IntelFortran Compiler Version < 2023.1
IntelInspector For Oneapi Version < 2023.1
IntelIpp Cryptography Version < 2021.7.0
IntelMpi Library Version < 2021.9.0
IntelOneapi Base Toolkit Version < 2023.1
IntelOneapi Data Analytics Library Version < 2023.1
IntelOneapi Dpc++/c++ Compiler Version < 2023.1
IntelOneapi Dpc++ Library (onedpl) Version < 2022.1
IntelOneapi Hpc Toolkit Version < 2023.1
IntelOneapi Iot Toolkit Version < 2023.1
IntelOneapi Math Kernel Library Version < 2023.1
IntelOneapi Rendering Toolkit Version < 2023.1
IntelOneapi Threading Building Blocks Version < 2021.9.0
IntelOpen Image Denoise Version < 1.4.3
IntelOpen Volume Kernel Library Version < 2023.1
IntelOspray Version < 2023.1
IntelOspray Studio Version < 2023.1
IntelTrace Analyzer And Collector Version < 2021.9.0
IntelVtune Profiler For Oneapi Version < 2023.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.194
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.3 1.3 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
secure@intel.com 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CWE-427 Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.