CVE-2023-45320

Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*

History

28 Aug 2025, 01:40

Type Values Removed Values Added
First Time Intel vtune Profiler
Intel
CPE cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01034.html - () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01034.html - Vendor Advisory

21 Nov 2024, 08:26

Type Values Removed Values Added
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01034.html - () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01034.html -

03 Jul 2024, 01:41

Type Values Removed Values Added
CWE CWE-269
Summary
  • (es) El elemento de ruta de búsqueda no controlado en algunos software Intel(R) VTune(TM) Profiler anterior a la versión 2024.0 puede permitir que un usuario autenticado potencialmente habilite la escalada de privilegios a través del acceso local.

16 May 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-16 21:15

Updated : 2025-08-28 01:40


NVD link : CVE-2023-45320

Mitre link : CVE-2023-45320

CVE.ORG link : CVE-2023-45320


JSON object : View

Products Affected

intel

  • vtune_profiler
CWE
CWE-427

Uncontrolled Search Path Element

CWE-269

Improper Privilege Management