CVE-2022-26512

Uncontrolled search path element in the Intel(R) FPGA Add-on for Intel(R) oneAPI Base Toolkit before version 2022.2 may allow an authenticated user to potentially enable escalation of privilege via local access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:intel:fpga_add-on:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:54

Type Values Removed Values Added
References () http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html - Vendor Advisory () http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html - Vendor Advisory
CVSS v2 : unknown
v3 : 7.3
v2 : unknown
v3 : 6.7

28 Feb 2023, 19:18

Type Values Removed Values Added
CPE cpe:2.3:a:intel:fpga_add-on:*:*:*:*:*:*:*:*
CWE CWE-427
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3
References (MISC) http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html - (MISC) http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html - Vendor Advisory

17 Feb 2023, 12:52

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-16 20:15

Updated : 2024-11-21 06:54


NVD link : CVE-2022-26512

Mitre link : CVE-2022-26512

CVE.ORG link : CVE-2022-26512


JSON object : View

Products Affected

intel

  • fpga_add-on
CWE
CWE-427

Uncontrolled Search Path Element