A potential security vulnerability in the Intel® SoC Watch driver may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability.
CVEID: CVE-2023-30763
Description: Heap-based overflow in Intel® SoC Watch based software before version 2021.1 may allow a privileged user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.2 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H****
Intel® Battery Life Diagnostic Tool before version 1.2.
Intel® oneAPI Base Toolkit before version 2021.4.0.
Intel recommends updating Intel® Battery Life Diagnostic Tool to version 1.2 or later.
Updates are available for download at this location:
<https://downloadcenter.intel.com/download/29348/Intel-Battery-Life-Diagnostic-Tool>
Intel recommends updating Intel® OneAPI Base Toolkit to version 2021.4.0 or later.
Updates are available for download at this location:
<https://software.intel.com/content/www/us/en/develop/tools/oneapi/base-toolkit/download.html>
The following issue was found internally by Intel employees. Intel would like to thank Anton Rechkov.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.