A potential security vulnerability in some Intel® Implicit SPMD Program Compiler (ISPC) software installers may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability.
CVEID: CVE-2023-27509
Description: Improper access control in some Intel® ISPC software installers before version 1.19.0 may allow an authenticated user to potentially enable escalation of privileges via local access.
CVSS Base Score: 6.6 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
Intel® ISPC software installer for Windows before version 1.19.0.
Intel recommends following the steps below to address these issues:
Optionally, if upgrade to version 1.19 is not possible, Intel recommends using the Intel® ISPC software installer to version 1.18.1 or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/developer/articles/tool/oneapi-standalone-components.html#inpage-nav-6-3>
Intel would like to thank FalconCorruption for reporting this issue.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.