Potential security vulnerabilities in some Intel® oneAPI Toolkits may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2022-40196
Description: Improper access control in the Intel® oneAPI DPC++/C++ Compiler before version 2022.2.1 and Intel® C++ Compiler Classic before version 2021.7.1 for some Intel® oneAPI Toolkits before version 2022.3.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.8 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H****
CVEID: CVE-2022-38136
Description: Uncontrolled search path in the Intel® oneAPI DPC++/C++ Compiler for Windows and Intel® Fortran Compiler for Windows before version 2022.2.1 for some Intel® oneAPI Toolkits before version 2022.3.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H****
CVEID: CVE-2022-41342
Description: Improper buffer restrictions in the Intel® C++ Compiler Classic before version 2021.7.1 for some Intel® oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.0 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L
Intel® oneAPI DPC++/C++ Compiler before version 2022.2.1.
Intel® C++ Compiler Classic before version 2021.7.1.
Intel® Fortran Compiler before version 2022.2.1.
The affected products above are available for stand-alone download and as part of in the Intel® oneAPI Toolkit downloads.
Intel recommends updating the Intel® oneAPI DPC++/C++ Compiler to version 2022.2.1 or later.
Intel® oneAPI Toolkit updates are available for download at these locations:
<https://www.intel.com/content/www/us/en/developer/tools/oneapi/base-toolkit-download.html>
<https://www.intel.com/content/www/us/en/developer/tools/oneapi/hpc-toolkit-download.html>
<https://www.intel.com/content/www/us/en/developer/tools/oneapi/iot-toolkit-download.html>
Standalone updates are available for download at this location:
<https://www.intel.com/content/www/us/en/developer/articles/tool/oneapi-standalone-components.html>
Intel recommends updating Intel® C++ Compiler (Classic) to version 2021.7.1 or later.
Intel® oneAPI Toolkit updates are available for download at these locations:
<https://www.intel.com/content/www/us/en/developer/tools/oneapi/hpc-toolkit-download.html>
<https://www.intel.com/content/www/us/en/developer/tools/oneapi/iot-toolkit-download.html>
Standalone updates are available for download at this location:
<https://www.intel.com/content/www/us/en/developer/articles/tool/oneapi-standalone-components.html>
Intel recommends updating the Intel® Fortran Compiler to version 2022.2.1 or later.
Intel® oneAPI Toolkit updates are available for download at these locations after 11/11/2022:
<https://www.intel.com/content/www/us/en/developer/tools/oneapi/base-toolkit-download.html>
<https://www.intel.com/content/www/us/en/developer/tools/oneapi/hpc-toolkit-download.html>
<https://www.intel.com/content/www/us/en/developer/tools/oneapi/iot-toolkit-download.html>
Standalone updates are available for download at this location after 11/11/2022:
<https://www.intel.com/content/www/us/en/developer/articles/tool/oneapi-standalone-components.html>
Intel would like to thank Victor Duta, Fabian Freyer, Fabio Pagani, Marius Muench, and Cristiano Giuffrida in the VUSec group at VU Amsterdam for CVE-2022-40196, houjingyi and internally by Intel employee Chunyang Dai for CVE-2022-38136, Hao Chi Kiang for CVE-2022-41342 for reporting these issues.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.