First published: Thu May 16 2024(Updated: )
Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel VTune Profiler for oneAPI | <2024.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45320 is classified as a high severity vulnerability due to its potential to allow privilege escalation.
To mitigate CVE-2023-45320, users should upgrade to Intel VTune Profiler version 2024.0 or later.
CVE-2023-45320 affects users of Intel VTune Profiler software prior to version 2024.0.
CVE-2023-45320 is an uncontrolled search path element vulnerability that can be exploited locally.
No, CVE-2023-45320 requires local access for exploitation.