First published: Wed Nov 13 2024(Updated: )
Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel VTune Profiler for oneAPI | <2024.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36245 is classified as a medium severity vulnerability due to its potential for escalation of privilege by authenticated users.
CVE-2024-36245 affects Intel VTune Profiler software versions prior to 2024.2.0.
To mitigate CVE-2024-36245, upgrade to Intel VTune Profiler version 2024.2.0 or later.
CVE-2024-36245 is caused by an uncontrolled search path element that could be exploited to escalate privileges.
Yes, local access is required to exploit CVE-2024-36245 as it affects authenticated users.