First published: Thu Feb 16 2023(Updated: )
Uncontrolled search path element in the Intel(R) oneAPI DPC++/C++ Compiler Runtime before version 2022.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel oneAPI DPC++/C++ Compiler Runtime | <2022.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-26421 is classified as moderate due to the potential for privilege escalation.
To fix CVE-2022-26421, upgrade to the Intel oneAPI DPC++/C++ Compiler Runtime version 2022.0 or later.
CVE-2022-26421 affects users of the Intel oneAPI DPC++/C++ Compiler Runtime before version 2022.0.
An authenticated user with local access can potentially exploit CVE-2022-26421 to escalate privileges.
The potential impacts of CVE-2022-26421 include unauthorized access and escalation of privileges on systems running affected versions.