Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.0.251 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
| Link | Resource |
|---|---|
| https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html | Vendor Advisory |
| https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:44
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
| References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html - Vendor Advisory |
19 May 2023, 13:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:a:intel:integrated_performance_primitives:*:*:*:*:*:*:*:* cpe:2.3:a:intel:open_volume_kernel_library:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_math_kernel_library:*:*:*:*:*:*:*:* cpe:2.3:a:intel:open_image_denoise:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_data_analytics_library:*:*:*:*:*:*:*:* cpe:2.3:a:intel:trace_analyzer_and_collector:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_dpc\+\+\/c\+\+_compiler:*:*:*:*:*:*:*:* cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_hpc_toolkit:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_deep_neural_network_library:*:*:*:*:*:*:*:* cpe:2.3:a:intel:embree_ray_tracing_kernel_library:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_threading_building_blocks:*:*:*:*:*:*:*:* cpe:2.3:a:intel:distribution_for_python:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_rendering_toolkit:*:*:*:*:*:*:*:* cpe:2.3:a:intel:integrated_performance_primitives_cryptography:*:*:*:*:*:*:*:* cpe:2.3:a:intel:advisor:*:*:*:*:*:oneapi:*:* cpe:2.3:a:intel:inspector:*:*:*:*:*:oneapi:*:* cpe:2.3:a:intel:dpc\+\+_compatibility_tool:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_video_processing_library:*:*:*:*:*:*:*:* cpe:2.3:a:intel:ospray_studio:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_dpc\+\+_library:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_iot_toolkit:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:* cpe:2.3:a:intel:ospray:*:*:*:*:*:*:*:* cpe:2.3:a:intel:fortran_compiler:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_hpc_toolkit:2023.0.0:*:*:*:*:*:*:* cpe:2.3:a:intel:cpu_runtime:*:*:*:*:*:opencl:*:* cpe:2.3:a:intel:implicit_spmd_program_compiler:*:*:*:*:*:*:*:* cpe:2.3:a:intel:mpi_library:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_toolkit_and_component_software_installers:*:*:*:*:*:*:*:* |
|
| CWE | CWE-427 | |
| References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00819.html - Vendor Advisory |
10 May 2023, 14:38
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-05-10 14:15
Updated : 2024-11-21 07:44
NVD link : CVE-2023-22355
Mitre link : CVE-2023-22355
CVE.ORG link : CVE-2023-22355
JSON object : View
Products Affected
intel
- inspector
- ospray_studio
- oneapi_video_processing_library
- mpi_library
- oneapi_iot_toolkit
- integrated_performance_primitives_cryptography
- embree_ray_tracing_kernel_library
- vtune_profiler
- ospray
- oneapi_dpc\+\+\/c\+\+_compiler
- implicit_spmd_program_compiler
- oneapi_base_toolkit
- cpu_runtime
- trace_analyzer_and_collector
- dpc\+\+_compatibility_tool
- oneapi_toolkit_and_component_software_installers
- oneapi_hpc_toolkit
- open_volume_kernel_library
- distribution_for_python
- fortran_compiler
- oneapi_dpc\+\+_library
- oneapi_math_kernel_library
- oneapi_threading_building_blocks
- oneapi_deep_neural_network_library
- advisor
- oneapi_data_analytics_library
- oneapi_rendering_toolkit
- open_image_denoise
- integrated_performance_primitives
CWE
CWE-427
Uncontrolled Search Path Element
