CVE-2023-22355

Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.0.251 may allow an authenticated user to potentially enable escalation of privilege via local access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:intel:advisor:*:*:*:*:*:oneapi:*:*
cpe:2.3:a:intel:cpu_runtime:*:*:*:*:*:opencl:*:*
cpe:2.3:a:intel:distribution_for_python:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:dpc\+\+_compatibility_tool:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:embree_ray_tracing_kernel_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:fortran_compiler:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:implicit_spmd_program_compiler:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:inspector:*:*:*:*:*:oneapi:*:*
cpe:2.3:a:intel:integrated_performance_primitives:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:integrated_performance_primitives_cryptography:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:mpi_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_data_analytics_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_deep_neural_network_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_dpc\+\+\/c\+\+_compiler:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_dpc\+\+_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_hpc_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_hpc_toolkit:2023.0.0:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_iot_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_math_kernel_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_rendering_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_threading_building_blocks:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_toolkit_and_component_software_installers:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_video_processing_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:open_image_denoise:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:open_volume_kernel_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:ospray:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:ospray_studio:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:trace_analyzer_and_collector:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*

History

19 May 2023, 13:35

Type Values Removed Values Added
References (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html - (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-427
CPE cpe:2.3:a:intel:integrated_performance_primitives:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:open_volume_kernel_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_math_kernel_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:open_image_denoise:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_data_analytics_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:trace_analyzer_and_collector:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_dpc\+\+\/c\+\+_compiler:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_hpc_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_deep_neural_network_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:embree_ray_tracing_kernel_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_threading_building_blocks:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:distribution_for_python:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_rendering_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:integrated_performance_primitives_cryptography:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:advisor:*:*:*:*:*:oneapi:*:*
cpe:2.3:a:intel:inspector:*:*:*:*:*:oneapi:*:*
cpe:2.3:a:intel:dpc\+\+_compatibility_tool:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_video_processing_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:ospray_studio:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_dpc\+\+_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_iot_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:ospray:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:fortran_compiler:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_hpc_toolkit:2023.0.0:*:*:*:*:*:*:*
cpe:2.3:a:intel:cpu_runtime:*:*:*:*:*:opencl:*:*
cpe:2.3:a:intel:implicit_spmd_program_compiler:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:mpi_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_toolkit_and_component_software_installers:*:*:*:*:*:*:*:*

10 May 2023, 14:38

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-10 14:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-22355

Mitre link : CVE-2023-22355

CVE.ORG link : CVE-2023-22355


JSON object : View

Products Affected

intel

  • embree_ray_tracing_kernel_library
  • dpc\+\+_compatibility_tool
  • implicit_spmd_program_compiler
  • advisor
  • integrated_performance_primitives_cryptography
  • mpi_library
  • oneapi_math_kernel_library
  • ospray
  • oneapi_hpc_toolkit
  • distribution_for_python
  • oneapi_video_processing_library
  • vtune_profiler
  • fortran_compiler
  • oneapi_rendering_toolkit
  • trace_analyzer_and_collector
  • ospray_studio
  • oneapi_data_analytics_library
  • oneapi_base_toolkit
  • oneapi_dpc\+\+\/c\+\+_compiler
  • inspector
  • integrated_performance_primitives
  • cpu_runtime
  • open_volume_kernel_library
  • oneapi_iot_toolkit
  • oneapi_deep_neural_network_library
  • open_image_denoise
  • oneapi_toolkit_and_component_software_installers
  • oneapi_dpc\+\+_library
  • oneapi_threading_building_blocks
CWE
CWE-427

Uncontrolled Search Path Element