7.3
CVE-2023-28823
- EPSS 0.06%
- Published 11.08.2023 03:15:26
- Last modified 21.11.2024 07:56:05
- Source secure@intel.com
- Teams watchlist Login
- Open Login
Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow an authenticated user to potentially enable escalation of privilege via local access.
Data is provided by the National Vulnerability Database (NVD)
Intel ≫ Advisor For Oneapi Version < 2023.1
Intel ≫ Cpu Runtime For Opencl Applications Version < 2023.1
Intel ≫ Distribution For Python Programming Language Version < 2023.1
Intel ≫ Dpc++ Compatibility Tool Version < 2023.1
Intel ≫ Embree Ray Tracing Kernel Library Version < 2023.1
Intel ≫ Fortran Compiler Version < 2023.1
Intel ≫ Implicit Spmd Program Compiler Version < 1.19.1
Intel ≫ Inspector For Oneapi Version < 2023.1
Intel ≫ Integrated Performance Primitives Version < 2021.8
Intel ≫ Ipp Cryptography Version < 2021.7.0
Intel ≫ Mpi Library Version < 2021.9.0
Intel ≫ Oneapi Base Toolkit Version < 2023.1
Intel ≫ Oneapi Data Analytics Library Version < 2023.1
Intel ≫ Oneapi Deep Neural Network Library Version < 2023.1
Intel ≫ Oneapi Dpc++/c++ Compiler Version < 2023.1
Intel ≫ Oneapi Dpc++ Library (onedpl) Version < 2022.1
Intel ≫ Oneapi Hpc Toolkit Version < 2023.1
Intel ≫ Oneapi Iot Toolkit Version < 2023.1
Intel ≫ Oneapi Math Kernel Library Version < 2023.1
Intel ≫ Oneapi Rendering Toolkit Version < 2023.1
Intel ≫ Oneapi Threading Building Blocks Version < 2021.9.0
Intel ≫ Oneapi Toolkit And Component Software Installer Version < 4.3.1.493
Intel ≫ Oneapi Video Processing Library Version < 2023.1
Intel ≫ Open Image Denoise Version < 1.4.3
Intel ≫ Open Volume Kernel Library Version < 2023.1
Intel ≫ Ospray Studio Version < 2023.1
Intel ≫ Trace Analyzer And Collector Version < 2021.9.0
Intel ≫ Vtune Profiler For Oneapi Version < 2023.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.194 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.3 | 1.3 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
secure@intel.com | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
|
CWE-427 Uncontrolled Search Path Element
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.