Lucene search

K
intelIntel Security CenterINTEL:INTEL-SA-00773
HistoryMar 13, 2023 - 12:00 a.m.

Intel® oneAPI Toolkit software Advisory

2023-03-1300:00:00
Intel Security Center
www.intel.com
18
intel
oneapi toolkits
security vulnerabilities
privilege escalation
updates
cve-2022-40196
cve-2022-38136
cve-2022-41342

EPSS

0

Percentile

13.2%

Summary:

Potential security vulnerabilities in some Intel® oneAPI Toolkits may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities.

Vulnerability Details:

CVEID: CVE-2022-40196

Description: Improper access control in the Intel® oneAPI DPC++/C++ Compiler before version 2022.2.1 and Intel® C++ Compiler Classic before version 2021.7.1 for some Intel® oneAPI Toolkits before version 2022.3.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS Base Score: 7.8 High

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H****

CVEID: CVE-2022-38136

Description: Uncontrolled search path in the Intel® oneAPI DPC++/C++ Compiler for Windows and Intel® Fortran Compiler for Windows before version 2022.2.1 for some Intel® oneAPI Toolkits before version 2022.3.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS Base Score: 6.7 Medium

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H****

CVEID: CVE-2022-41342

Description: Improper buffer restrictions in the Intel® C++ Compiler Classic before version 2021.7.1 for some Intel® oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS Base Score: 6.0 Medium

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L

Affected Products:

Intel® oneAPI DPC++/C++ Compiler before version 2022.2.1.

Intel® C++ Compiler Classic before version 2021.7.1.

Intel® Fortran Compiler before version 2022.2.1.

Recommendation:

The affected products above are available for stand-alone download and as part of in the Intel® oneAPI Toolkit downloads.

Intel recommends updating the Intel® oneAPI DPC++/C++ Compiler to version 2022.2.1 or later.

Intel® oneAPI Toolkit updates are available for download at these locations:

<https://www.intel.com/content/www/us/en/developer/tools/oneapi/base-toolkit-download.html&gt;

<https://www.intel.com/content/www/us/en/developer/tools/oneapi/hpc-toolkit-download.html&gt;

<https://www.intel.com/content/www/us/en/developer/tools/oneapi/iot-toolkit-download.html&gt;

Standalone updates are available for download at this location:

<https://www.intel.com/content/www/us/en/developer/articles/tool/oneapi-standalone-components.html&gt;

Intel recommends updating Intel® C++ Compiler (Classic) to version 2021.7.1 or later.

Intel® oneAPI Toolkit updates are available for download at these locations:

<https://www.intel.com/content/www/us/en/developer/tools/oneapi/hpc-toolkit-download.html&gt;

<https://www.intel.com/content/www/us/en/developer/tools/oneapi/iot-toolkit-download.html&gt;

Standalone updates are available for download at this location:

<https://www.intel.com/content/www/us/en/developer/articles/tool/oneapi-standalone-components.html&gt;

Intel recommends updating the Intel® Fortran Compiler to version 2022.2.1 or later.

Intel® oneAPI Toolkit updates are available for download at these locations after 11/11/2022:

<https://www.intel.com/content/www/us/en/developer/tools/oneapi/base-toolkit-download.html&gt;

<https://www.intel.com/content/www/us/en/developer/tools/oneapi/hpc-toolkit-download.html&gt;

<https://www.intel.com/content/www/us/en/developer/tools/oneapi/iot-toolkit-download.html&gt;

Standalone updates are available for download at this location after 11/11/2022:

<https://www.intel.com/content/www/us/en/developer/articles/tool/oneapi-standalone-components.html&gt;

Acknowledgements:

Intel would like to thank Victor Duta, Fabian Freyer, Fabio Pagani, Marius Muench, and Cristiano Giuffrida in the VUSec group at VU Amsterdam for CVE-2022-40196, houjingyi and internally by Intel employee Chunyang Dai for CVE-2022-38136, Hao Chi Kiang for CVE-2022-41342 for reporting these issues.

Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.

EPSS

0

Percentile

13.2%

Related for INTEL:INTEL-SA-00773