Incorrect default permissions in the software installer for the Intel(R) VTune(TM) Profiler before version 2021.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html | Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html - Vendor Advisory |
22 Nov 2021, 18:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00556.html - Vendor Advisory | |
CWE | CWE-276 | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.8 |
17 Nov 2021, 20:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-17 20:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-33062
Mitre link : CVE-2021-33062
CVE.ORG link : CVE-2021-33062
JSON object : View
Products Affected
intel
- vtune_profiler
CWE
CWE-276
Incorrect Default Permissions