First published: Thu Feb 16 2023(Updated: )
Improper handling of Unicode encoding in source code to be compiled by the Intel(R) C++ Compiler Classic before version 2021.6 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel C++ Compiler Classic | <2021.6 | |
Intel oneAPI Toolkits | <2022.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25987 has a medium severity rating due to its potential for allowing escalation of privilege.
To fix CVE-2022-25987, upgrade the Intel C++ Compiler Classic to version 2021.6 or later.
CVE-2022-25987 affects Intel C++ Compiler Classic versions prior to 2021.6 and Intel oneAPI Toolkits versions prior to 2022.2.
Yes, CVE-2022-25987 can potentially be exploited via network access by an unauthenticated user.
CVE-2022-25987 can facilitate escalation of privilege attacks.