CVE-2023-24592

Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:intel:advisor:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:inspector:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:mpi_library:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:intel:oneapi_hpc_toolkit:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:48

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.3
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html - Patch, Vendor Advisory () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html - Patch, Vendor Advisory

28 Nov 2023, 16:58

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-14 19:15

Updated : 2024-11-21 07:48


NVD link : CVE-2023-24592

Mitre link : CVE-2023-24592

CVE.ORG link : CVE-2023-24592


JSON object : View

Products Affected

intel

  • oneapi_hpc_toolkit
  • mpi_library
  • oneapi_base_toolkit
  • inspector
  • advisor
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')