First published: Tue Nov 14 2023(Updated: )
Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Advisor | <2023.1 | |
Intel Inspector | <2023.1 | |
Intel MPI Library | <2023.1 | |
Intel Oneapi Base Toolkit | <2023.1 | |
Intel Oneapi Hpc Toolkit | <2023.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24592 is a vulnerability that allows an authenticated user to potentially enable escalation of privilege via local access in some Intel(R) oneAPI Toolkits and Component software before version 2023.1.
CVE-2023-24592 has a severity rating of high with a CVSS score of 7.3.
CVE-2023-24592 affects Intel(R) oneAPI Toolkits and Component software versions before 2023.1.
An authenticated user can exploit CVE-2023-24592 by exploiting path traversal to potentially enable escalation of privilege via local access.
Yes, upgrading to version 2023.1 or later of the affected Intel(R) oneAPI Toolkits and Component software will fix the CVE-2023-24592 vulnerability.