First published: Thu Feb 16 2023(Updated: )
Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel oneAPI dpc\+\+\/c\+\+ compiler | <2022.1 | |
Intel oneAPI Toolkits | <2022.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26843 has a moderate severity rating due to the potential for privilege escalation.
To mitigate CVE-2022-26843, upgrade to Intel oneAPI DPC++/C++ Compiler version 2022.1 or later and Intel oneAPI Toolkits version 2022.2 or later.
Users of Intel oneAPI DPC++/C++ Compiler versions prior to 2022.1 and Intel oneAPI Toolkits prior to 2022.2 are affected by CVE-2022-26843.
CVE-2022-26843 may allow an unauthenticated user to escalate privileges via network access.
There are no specific workarounds for CVE-2022-26843; upgrading to the fixed software versions is the recommended approach.