First published: Wed Aug 14 2024(Updated: )
Incorrect default permissions for some Intel(R) Advisor software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Advisor for oneAPI | <2024.1 | |
Intel oneAPI Base Toolkit | <2024.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26025 is classified as a medium severity vulnerability due to its potential for escalation of privilege.
To fix CVE-2024-26025, upgrade Intel Advisor software or Intel oneAPI Base Toolkit to version 2024.1 or later.
Users of Intel(R) Advisor software and Intel oneAPI Base Toolkit prior to version 2024.1 are affected by CVE-2024-26025.
CVE-2024-26025 is an access control vulnerability that may allow unauthorized escalation of privileges.
Yes, local access is required to exploit CVE-2024-26025 due to incorrect default permissions.