Lucene search

K
cve[email protected]CVE-2022-26512
HistoryFeb 16, 2023 - 8:15 p.m.

CVE-2022-26512

2023-02-1620:15:13
CWE-427
web.nvd.nist.gov
28
cve-2022-26512
intel
fpga
add-on
privilege escalation
local access

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

Uncontrolled search path element in the Intel® FPGA Add-on for Intel® oneAPI Base Toolkit before version 2022.2 may allow an authenticated user to potentially enable escalation of privilege via local access.

Affected configurations

Vulners
NVD
Node
inteloneapi_base_toolkitRange<2022.2

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Intel(R) FPGA Add-on for Intel(R) oneAPI Base Toolkit",
    "versions": [
      {
        "version": "before version 2022.2",
        "status": "affected"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2022-26512