Heap-based overflow in Intel(R) SoC Watch based software before version 2021.1 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 May 2023, 01:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:intel:battery_life_diagnostic_tool:*:*:*:*:*:*:*:* cpe:2.3:a:intel:soc_watch:*:*:*:*:*:*:*:* cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:* |
|
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00547.html - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
CWE | CWE-787 |
12 May 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-12 15:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-30763
Mitre link : CVE-2023-30763
CVE.ORG link : CVE-2023-30763
JSON object : View
Products Affected
intel
- soc_watch
- battery_life_diagnostic_tool
- oneapi_base_toolkit