7.8

CVE-2023-35121

Improper access control in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 for some Intel(R) oneAPI Toolkits before version  2022.3.1 may allow authenticated user to potentially enable escalation of privilege via local access.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorintel
Product advisor
Default Statusunknown
Version < 2023.2.0
Version 0
Status affected
Vendorintel
Product inspector
Default Statusunknown
Version < 2023.2.0
Version 0
Status affected
Vendorintel
Product oneapi_ai_analytics_toolkit
Default Statusunknown
Version < 2023.2
Version 0
Status affected
Vendorintel
Product oneapi_base_toolkit
Default Statusunknown
Version < 2023.2.0
Version 0
Status affected
Vendorintel
Product oneapi_deep_neural_network
Default Statusunknown
Version < 2023.2.0
Version 0
Status affected
Vendorintel
Product oneapi_hpc_toolkit
Default Statusunknown
Version < 2023.2.0
Version 0
Status affected
Vendorintel
Product oneapi_iot_toolkit
Default Statusunknown
Version < 2023.2.0
Version 0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.122
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secure@intel.com 7.8 1.1 6
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.