Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2023-27383
Analyzed
More InfoOfficial Page
Source-secure@intel.com
View Known Exploited Vulnerability (KEV) details
Published At-14 Nov, 2023 | 19:15
Updated At-30 Nov, 2023 | 16:39

Protection mechanism failure in some Intel(R) oneAPI HPC Toolkit 2023.1 and Intel(R)MPI Library software before version 2021.9 may allow a privileged user to potentially enable escalation of privilege via adjacent access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.8MEDIUM
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.16.8MEDIUM
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Intel Corporation
intel
>>advisor>>Versions before 2023.1(exclusive)
cpe:2.3:a:intel:advisor:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>inspector>>Versions before 2023.1(exclusive)
cpe:2.3:a:intel:inspector:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>mpi_library>>Versions before 2021.9(exclusive)
cpe:2.3:a:intel:mpi_library:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>oneapi_base_toolkit>>Versions before 2023.1(exclusive)
cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>oneapi_hpc_toolkit>>Versions before 2023.1(exclusive)
cpe:2.3:a:intel:oneapi_hpc_toolkit:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE-693Secondarysecure@intel.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.htmlsecure@intel.com
Patch
Vendor Advisory
Change History
0Changes found

Details not found