Uncontrolled search path in some Intel(R) VPL software before version 2023.4.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
History

Thu, 13 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Feb 2025 21:30:00 +0000

Type Values Removed Values Added
Description Uncontrolled search path in some Intel(R) VPL software before version 2023.4.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2025-02-13T20:20:14.654Z

Reserved: 2024-01-10T04:00:05.947Z

Link: CVE-2024-21830

cve-icon Vulnrichment

Updated: 2025-02-13T20:19:59.542Z

cve-icon NVD

Status : Received

Published: 2025-02-12T22:15:31.073

Modified: 2025-02-12T22:15:31.073

Link: CVE-2024-21830

cve-icon Redhat

No data.