Uncontrolled search path element in some Intel(R) VTune(TM) Profiler software before version 2024.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01187.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
02 Sep 2025, 15:10
Type | Values Removed | Values Added |
---|---|---|
First Time |
Intel system Bring-up Toolkit
Intel Intel oneapi Base Toolkit Intel vtune Profiler |
|
CPE | cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:* cpe:2.3:a:intel:system_bring-up_toolkit:*:*:*:*:*:*:*:* cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:* |
|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01187.html - Vendor Advisory |
Information
Published : 2024-11-13 21:15
Updated : 2025-09-02 15:10
NVD link : CVE-2024-36245
Mitre link : CVE-2024-36245
CVE.ORG link : CVE-2024-36245
JSON object : View
Products Affected
intel
- vtune_profiler
- system_bring-up_toolkit
- oneapi_base_toolkit
CWE
CWE-427
Uncontrolled Search Path Element