Potential security vulnerabilities in some Intel® Extreme Tuning Utility (XTU) software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2023-32647
Description: Improper access control in some Intel® XTU software before version 7.12.0.29 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.8 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H
CVEID: CVE-2023-28407
Description: Uncontrolled search path in some Intel® XTU software before version 7.12.0.29 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.7 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2023-38561
Description: Improper access control in some Intel® XTU software before version 7.12.0.29 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 5.5 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Intel® XTU software before version 7.12.0.29.
Intel recommends updating Intel® XTU software to version 7.12.0.29 or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/download/17881>
Intel would like to thank ycdxsb (CVE-2023-32647) for reporting this issue.
The following issues were found internally by an Intel employee (CVE-2023-28407, CVE-2023-38561). Intel would like to thank Oleg Sidletskiy.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.