First published: Wed Aug 14 2024(Updated: )
Uncontrolled search path in some Intel(R) High Level Synthesis Compiler software before version 23.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel High Level Synthesis Compiler | <23.4 | |
Intel oneAPI dpc\+\+\/c\+\+ compiler | <2024.1 | |
Intel Quartus Prime | <23.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23907 has been classified with a medium severity level due to the potential for privilege escalation.
To fix CVE-2024-23907, upgrade to Intel High Level Synthesis Compiler version 23.4 or later, or to a suitable version of the affected Intel software.
CVE-2024-23907 affects users of Intel High Level Synthesis Compiler, Intel oneAPI dpc++/c++ compiler, and Intel Quartus Prime versions prior to 23.4.
CVE-2024-23907 requires local access for exploitation, as it is not inherently a remote vulnerability.
CVE-2024-23907 can potentially allow authenticated users to escalate their privileges on affected systems.