Intel Product Security Update Advisory

Overview

An update has been released to address vulnerabilities in Intel Products. Users of the affected versions are advised to update to the latest version.

 

Affected Products

 

CVE-2024-28172

  • Intel® Trace Analyzer and Collector versions: ~ 2022.1 (excluded)
  • Intel® oneAPI HPC Toolkit versions: ~ 2024.1.0 (excluded)

 

CVE-2024-26027

  • Intel® Simics Package Manager Software versions: ~ 1.8.3 (excluded)

 

CVE-2024-28876

  • Intel® MPI Library versions: ~ 2021.12 (excluded)
  • Intel® oneAPI HPC Toolkit versions: ~ 2024.1 (excluded)

 

CVE-2024-23907

  • Intel® High Level Synthesis Compiler software versions: ~ 23.4 (excluded)
  • Intel® Quartus® Prime Pro Edition Design software versions: ~ 23.4 (excluded)
  • Intel® DPC++ C++ Compiler software versions: ~ 2024.1 (excluded)

 

CVE-2024-26025

  • Intel® Advisor software versions: ~ 2024.1 (excluded)
  • Intel® oneAPI Base Toolkit versions: ~ 2024.1 (excluded)

 

CVE-2024-28046

  • Intel® GPA software versions: ~ 2024.1 (excluded)

 

CVE-2024-23909

  • Intel® FPGA SDK for OpenCL™ software technology all versions

 

 

Resolved Vulnerabilities

 

Uncontrolled search path in some Intel(R) Trace Analyzer and Collector software allows authenticated users to escalate privileges via local access (CVE-2024-28172)

Vulnerability in some Intel(R) Simics Package Manager software via an uncontrolled search path that allows an authenticated user to escalate privileges via local access (CVE-2024-26027)

Vulnerability in some Intel(R) MPI Library software via an uncontrolled search path that could allow an authenticated user to escalate privileges via local access (CVE-2024-28876)

Uncontrolled search path in some Intel(R) High Level Synthesis Compiler software allows an authenticated user to escalate privileges via local access (CVE-2024-23907)

Incorrect default privileges in some Intel(R) Advisor software could allow an authenticated user to escalate privileges via local access (CVE-2024-26025)

Vulnerability in some Intel(R) GPA software via an uncontrolled search path, which could allow an authenticated user to escalate privileges via local access (CVE-2024-28046)

Uncontrolled search path in some Intel(R) FPGA SDKs allows an authenticated user to escalate privileges via local access (CVE-2024-23909)

 

Vulnerability Patches

 

The following product-specific Vulnerability Patches have been made available with the latest update. If you are using an affected version, Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

 

CVE-2024-28172

  • Intel® Trace Analyzer and Collector versions: 2022.1 or later versions
  • Intel® oneAPI HPC Toolkit version: 2024.1.0 or later versions

 

CVE-2024-26027

  • Intel® Simics Package Manager Software versions: 1.8.3 or later versions

 

CVE-2024-28876

  • Intel® MPI Library versions: 2021.12 or later versions
  • Intel® oneAPI HPC Toolkit versions: 2024.1 or later versions

 

CVE-2024-23907

  • Intel® High Level Synthesis Compiler software versions: 23.4 or later versions
  • Intel® Quartus® Prime Pro Edition Design software versions: 23.4 or later versions
  • Intel® DPC++ C++ Compiler software versions: 2024.1 or later versions

 

CVE-2024-26025

  • Intel® Advisor software versions: 2024.1 or later versions
  • Intel® oneAPI Base Toolkit versions: 2024.1 or later version

 

CVE-2024-28046

  • Intel® GPA software versions: 2024.1 or later versions

 

CVE-2024-23909

These products have been discontinued and users of these products are advised to migrate to the Intel® FPGA Add-on for oneAPI Base Toolkit as soon as possible.

Updates are available for download at the following locations.

Intel® FPGA Add-on for oneAPI Base Toolkit download:
https://www.intel.com/content/www/us/en/developer/tools/oneapi/fpga.html

 

References

[1] CVE-2024-28172 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-28172

[2] Intel® Trace Analyzer and Collector Software Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01117.html

[3] CVE-2024-26027 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26027

[4] Intel® Simics Package Manager Software Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01116.html

[5] CVE-2024-28876 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-28876

[6] Intel® MPI Library Software Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01115.html

[7] CVE-2024-23907 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-23907

[8] Intel® High Level Synthesis Compiler Software Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01113.html

[9] CVE-2024-26025 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-26025

[10] Intel® Advisor Software Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01110.html

[11] CVE-2024-28046 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-28046

[12] Intel® GPA Software Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01105.html

[13] CVE-2024-23909 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-23909

[14] Intel® FPGA SDK for OpenCL™ Software Technology Advisory

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01104.html