First published: Wed Feb 14 2024(Updated: )
Improper access control in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.2.1 for some Intel(R) oneAPI Toolkits before version 2022.3.1 may allow authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel oneAPI DPC++/C++ Compiler | <2022.2.1 | |
Intel oneAPI Toolkits | <2022.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35121 has been classified with a severity that indicates potential privilege escalation risks for authenticated users.
To fix CVE-2023-35121, update the Intel oneAPI DPC++/C++ Compiler to version 2022.2.1 or later and the Intel oneAPI Toolkits to version 2022.3.1 or later.
CVE-2023-35121 affects users of Intel oneAPI DPC++/C++ Compiler versions prior to 2022.2.1 and Intel oneAPI Toolkits versions prior to 2022.3.1.
CVE-2023-35121 is classified as an improper access control vulnerability.
No, CVE-2023-35121 requires local access by an authenticated user to exploit the privilege escalation.