{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T18:14:47.717","vulnerabilities":[{"cve":{"id":"CVE-2023-29162","sourceIdentifier":"secure@intel.com","published":"2024-02-14T14:15:49.777","lastModified":"2026-01-14T18:27:26.690","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper buffer restrictions the Intel(R) C++ Compiler Classic before version 2021.8 for Intel(R) oneAPI Toolkits before version 2022.3.1 may allow a privileged user to potentially enable escalation of privilege via local access.\n\n"},{"lang":"es","value":"Las restricciones inadecuadas del búfer en algunos compiladores Intel(R) C++ Classic anteriores a la versión 2021.8 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a través del acceso local."}],"metrics":{"cvssMetricV31":[{"source":"secure@intel.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L","baseScore":6.0,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":0.5,"impactScore":5.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-276"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:intel:advisor:*:*:*:*:*:*:*:*","versionEndExcluding":"2023.2","matchCriteriaId":"0F19FC1B-ABBC-4AD1-A3EF-FEF6CA6DF90C"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:cluster_checker:2021.7.3:*:*:*:*:*:*:*","matchCriteriaId":"535F8418-033A-4EAC-9E9B-2BBA83CB885B"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:distribution_for_python:2023.1:*:*:*:*:*:*:*","matchCriteriaId":"7F7A8ABC-B220-46D2-A6CE-FDEE08388C49"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:inspector:*:*:*:*:*:*:*:*","versionEndExcluding":"2023.2","matchCriteriaId":"DF8676B2-8B07-4489-AE24-5AFF7B318E73"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:integrated_performance_primitives:2021.9:*:*:*:*:*:*:*","matchCriteriaId":"9A2EE063-5A38-40DD-A2C3-BF10664085AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:integrated_performance_primitives_cryptography:*:*:*:*:*:*:*:*","versionEndExcluding":"2021.8","matchCriteriaId":"1DA1F6A6-E2FC-4243-81E3-2E8CA4AA4CD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:mpi_library:*:*:*:*:*:*:*:*","versionEndExcluding":"2021.10","matchCriteriaId":"C6B7FC0C-D3DA-40A2-8D69-2056656F84A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:oneapi_ai_analytics_toolkit:2023.2:*:*:*:*:*:*:*","matchCriteriaId":"16B6BCCB-F33F-49B6-B87B-CC93E30C82B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:oneapi_base_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"2023.2","matchCriteriaId":"2C7E4E29-75C3-4B97-AB86-C82A3214D558"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:oneapi_base_toolkit:2023.2:*:*:*:*:*:*:*","matchCriteriaId":"11501F04-FAA8-44F9-BD4F-105458A6252B"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:oneapi_deep_neural_network:*:*:*:*:*:*:*:*","versionEndExcluding":"2023.2","matchCriteriaId":"4B6DA864-1A74-4706-832B-2D8453A55D06"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:oneapi_deep_neural_network:2023.2:*:*:*:*:*:*:*","matchCriteriaId":"76639D6F-2583-455B-8A0E-7B412C18C485"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:oneapi_hpc_toolkit:2023.2:*:*:*:*:*:*:*","matchCriteriaId":"7E2D9438-CC9E-4070-97E6-6300064CF136"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:oneapi_iot_toolkit:2023.2:*:*:*:*:*:*:*","matchCriteriaId":"776C3236-F480-446D-93ED-E1A8D9CBA108"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:oneapi_math_kernel_library:*:*:*:*:*:*:*:*","versionEndExcluding":"2023.2","matchCriteriaId":"AFF32E88-710F-4622-AC69-4E6A04B8F9D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:threading_building_blocks:*:*:*:*:*:*:*:*","versionEndExcluding":"2021.10","matchCriteriaId":"8FD857AA-0809-464A-A0FF-13CF527A83AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:trace_analyzer_and_collector:2021.10.0:*:*:*:*:*:*:*","matchCriteriaId":"68072344-62DC-40C5-9704-1ABCF20E1701"},{"vulnerable":true,"criteria":"cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:-:*:*","versionEndExcluding":"2023.2","matchCriteriaId":"ABB740DA-24E8-44DF-9E15-C12BD497AFE6"}]}]}],"references":[{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html","source":"secure@intel.com","tags":["Vendor Advisory"]},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00988.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}