Potential security vulnerabilities in some Intel® Driver & Support Assistant (DSA) software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities.
CVEID: CVE-2023-39425
Description: Improper access control in some Intel® DSA software before version 23.4.33 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS Base Score: 8.8 High
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVEID: CVE-2023-35062
Description: Improper access control in some Intel® DSA software before version 23.4.33 may allow a privileged user to potentially enable escalation of privilege via local access.
CVSS Base Score: 6.3 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVEID: CVE-2023-25073
Description: Improper access control in some Intel® DSA software before version 23.4.33 may allow an authenticated user to potentially enable denial of service via local access.
CVSS Base Score: 5.5 Medium
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Intel® DSA software before version 23.4.33.
Intel recommends that users of Intel® DSA software update to 23.4.33 or later.
Updates are available for download at this location:
<https://www.intel.com/content/www/us/en/support/intel-driver-support-assistant.html>
Intel would like to thank sim0nsecurity (CVE-2023-39425), ycdxsb (CVE-2023-25073) and an external user (CVE-2023-35062) for reporting these issues.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.