First published: Wed Aug 14 2024(Updated: )
Uncontrolled search path in some Intel(R) IPP software before version 2021.11 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Integrated Performance Primitives | <2021.11 | |
Intel oneAPI Base Toolkit | <2024.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28887 has a medium severity rating due to the potential for privilege escalation for authenticated users.
To fix CVE-2024-28887, upgrade Intel Integrated Performance Primitives or Intel oneAPI Base Toolkit to versions later than 2021.11 and 2024.1 respectively.
CVE-2024-28887 affects Intel Integrated Performance Primitives prior to version 2021.11 and Intel oneAPI Base Toolkit versions up to 2024.1.
CVE-2024-28887 can potentially be exploited by authenticated users with local access to the affected software.
CVE-2024-28887 may allow an authenticated user to escalate privileges, potentially leading to unauthorized access to sensitive data or functionality.