Lucene search

K
vulnrichmentIntelVULNRICHMENT:CVE-2023-41231
HistoryFeb 14, 2024 - 1:37 p.m.

CVE-2023-41231

2024-02-1413:37:51
CWE-276
intel
github.com
3
intel
acat
software
permissions
privilege escalation
local access

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Incorrect default permissions in some ACAT software maintained by Intel® before version 2.0.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:intel:assistive_context-aware_toolkit:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "assistive_context-aware_toolkit",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.0.0",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-41231