Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
| Link | Resource |
|---|---|
| https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01034.html | Vendor Advisory |
| https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01034.html | Vendor Advisory |
Configurations
History
28 Aug 2025, 01:40
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:* | |
| First Time |
Intel
Intel vtune Profiler |
|
| References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01034.html - Vendor Advisory |
Information
Published : 2024-05-16 21:15
Updated : 2025-08-28 01:40
NVD link : CVE-2023-45320
Mitre link : CVE-2023-45320
CVE.ORG link : CVE-2023-45320
JSON object : View
Products Affected
intel
- vtune_profiler
