First published: Mon Feb 06 2023(Updated: )
Improper access control in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 and Intel C++ Compiler Classic before version 2021.7.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Oneapi Dpc\+\+\/c\+\+ Compiler | <2022.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security advisory is CVE-2022-40196.
The affected software for this vulnerability is the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 and Intel C++ Compiler Classic before version 2021.7.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1.
The severity of CVE-2022-40196 is high with a CVSS score of 7.8.
The potential impact of this vulnerability is the potential enablement of escalation of privilege by an authenticated user via local access.
To fix the vulnerability CVE-2022-40196, it is recommended to update the Intel(R) oneAPI DPC++/C++ Compiler to version 2022.2.1 or later, and Intel C++ Compiler Classic to version 2021.7.1 or later for the affected Intel(R) oneAPI Toolkits.