7.3
CWE
427
Advisory Published
Updated

CVE-2023-28823

First published: Fri Aug 11 2023(Updated: )

Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow an authenticated user to potentially enable escalation of privilege via local access.

Credit: secure@intel.com secure@intel.com

Affected SoftwareAffected VersionHow to fix
Intel Advisor For Oneapi<2023.1
Intel Cpu Runtime For Opencl Applications<2023.1
Intel Distribution For Python Programming Language<2023.1
Intel Dpc\+\+ Compatibility Tool<2023.1
Intel Embree Ray Tracing Kernel Library<2023.1
Intel Fortran Compiler<2023.1
Intel Implicit Spmd Program Compiler<1.19.1
Intel Inspector For Oneapi<2023.1
Intel Integrated Performance Primitives<2021.8
Intel Ipp Cryptography<2021.7.0
Intel MPI Library<2021.9.0
Intel Oneapi Base Toolkit<2023.1
Intel Oneapi Data Analytics Library<2023.1
Intel Oneapi Deep Neural Network Library<2023.1
Intel Oneapi Dpc\+\+\/c\+\+ Compiler<2023.1
Intel Oneapi Dpc\+\+ Library \(onedpl\)<2022.1
Intel Oneapi Hpc Toolkit<2023.1
Intel Oneapi Iot Toolkit<2023.1
Intel Oneapi Math Kernel Library<2023.1
Intel Oneapi Rendering Toolkit<2023.1
Intel Oneapi Threading Building Blocks<2021.9.0
Intel Oneapi Toolkit And Component Software Installer<4.3.1.493
Intel Oneapi Video Processing Library<2023.1
Intel Open Image Denoise<1.4.3
Intel Open Volume Kernel Library<2023.1
Intel Ospray<2023.1
Intel Ospray Studio<2023.1
Intel Trace Analyzer and Collector<2021.9.0
Intel Vtune Profiler For Oneapi<2023.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-28823?

    CVE-2023-28823 is a vulnerability that allows an authenticated user to potentially enable escalation of privilege via local access.

  • Which software is affected by CVE-2023-28823?

    The following Intel(R) oneAPI Toolkit and component software installers are affected: Intel Advisor for OneAPI, Intel CPU Runtime for OpenCL Applications, Intel Distribution for Python Programming Language, Intel DPC++ Compatibility Tool, Intel Embree Ray Tracing Kernel Library, Intel Fortran Compiler, Intel Implicit SPMD Program Compiler, Intel Inspector for OneAPI, Intel Integrated Performance Primitives, Intel IPP Cryptography, Intel MPI Library, Intel OneAPI Base Toolkit, Intel OneAPI Data Analytics Library, Intel OneAPI Deep Neural Network Library, Intel OneAPI DPC++/C++ Compiler, Intel OneAPI DPC++ Library (oneDPL), Intel OneAPI HPC Toolkit, Intel OneAPI IoT Toolkit, Intel OneAPI Math Kernel Library, Intel OneAPI Rendering Toolkit, Intel OneAPI Threading Building Blocks, Intel OneAPI Toolkit and Component Software Installer, Intel OneAPI Video Processing Library, Intel Open Image Denoise, Intel Open Volume Kernel Library, Intel OSPRay, Intel OSPRay Studio, Intel Trace Analyzer and Collector, Intel VTune Profiler for OneAPI.

  • What is the severity of CVE-2023-28823?

    The severity of CVE-2023-28823 is high with a CVSS score of 7.3.

  • How can an authenticated user exploit CVE-2023-28823?

    An authenticated user can potentially enable escalation of privilege via local access.

  • Where can I find more information about CVE-2023-28823?

    You can find more information about CVE-2023-28823 at the following reference: [Intel Security Advisory INTEL-SA-00890](http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00890.html)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203