CVE-2023-27391
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/08/2023
Last modified:
07/11/2023
Description
Improper access control in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow a privileged user to potentially enable escalation of privilege via local access.
Impact
Base Score 3.x
6.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:intel:advisor_for_oneapi:*:*:*:*:*:*:*:* | 2023.1 (excluding) | |
| cpe:2.3:a:intel:cpu_runtime_for_opencl_applications:*:*:*:*:*:*:*:* | 2023.1 (excluding) | |
| cpe:2.3:a:intel:distribution_for_python_programming_language:*:*:*:*:*:*:*:* | 2023.1 (excluding) | |
| cpe:2.3:a:intel:dpc\+\+_compatibility_tool:*:*:*:*:*:*:*:* | 2023.1 (excluding) | |
| cpe:2.3:a:intel:embree_ray_tracing_kernel_library:*:*:*:*:*:*:*:* | 2023.1 (excluding) | |
| cpe:2.3:a:intel:fortran_compiler:*:*:*:*:*:*:*:* | 2023.1 (excluding) | |
| cpe:2.3:a:intel:implicit_spmd_program_compiler:*:*:*:*:*:*:*:* | 1.19.1 (excluding) | |
| cpe:2.3:a:intel:inspector_for_oneapi:*:*:*:*:*:*:*:* | 2023.1 (excluding) | |
| cpe:2.3:a:intel:integrated_performance_primitives:*:*:*:*:*:*:*:* | 2021.8 (excluding) | |
| cpe:2.3:a:intel:ipp_cryptography:*:*:*:*:*:*:*:* | 2021.7.0 (excluding) | |
| cpe:2.3:a:intel:mpi_library:*:*:*:*:*:*:*:* | 2021.9.0 (excluding) | |
| cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:* | 2023.1 (excluding) | |
| cpe:2.3:a:intel:oneapi_data_analytics_library:*:*:*:*:*:*:*:* | 2023.1 (excluding) | |
| cpe:2.3:a:intel:oneapi_deep_neural_network_library:*:*:*:*:*:*:*:* | 2023.1 (excluding) | |
| cpe:2.3:a:intel:oneapi_dpc\+\+\/c\+\+_compiler:*:*:*:*:*:*:*:* | 2023.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



