CVE-2023-24592

7.3 HIGH

📋 TL;DR

This path traversal vulnerability in Intel oneAPI Toolkits allows authenticated users with local access to potentially escalate privileges by manipulating file paths. It affects users running vulnerable versions of Intel oneAPI software components. The vulnerability could allow attackers to access or modify files outside intended directories.

💻 Affected Systems

Products:
  • Intel oneAPI Toolkits
  • Intel oneAPI Components
Versions: Versions before 2023.1
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to the system running vulnerable oneAPI software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains full system control through privilege escalation, potentially compromising the entire system and accessing sensitive data.

🟠

Likely Case

Authenticated user escalates privileges to perform unauthorized actions within the oneAPI environment, potentially accessing other user data or system resources.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: LOW - Requires authenticated local access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Requires authenticated access but could be exploited by malicious insiders or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of the vulnerable component. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.1 or later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html

Restart Required: Yes

Instructions:

1. Download Intel oneAPI version 2023.1 or later from Intel's official website. 2. Uninstall previous vulnerable versions. 3. Install the updated version. 4. Restart affected systems.

🔧 Temporary Workarounds

Restrict User Access

all

Limit access to oneAPI installations to only trusted, necessary users

File System Permissions

linux

Set strict file permissions on oneAPI directories to prevent unauthorized access

chmod 750 /opt/intel/oneapi/
chown root:trustedgroup /opt/intel/oneapi/

🧯 If You Can't Patch

  • Implement strict access controls and principle of least privilege for oneAPI users
  • Monitor file access patterns and audit logs for suspicious path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check oneAPI version using 'oneapi-cli --version' or examine installed packages for versions before 2023.1

Check Version:

oneapi-cli --version

Verify Fix Applied:

Confirm version is 2023.1 or later using version check command and verify no path traversal attempts in logs

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in oneAPI directories
  • Path traversal strings in application logs
  • Failed privilege escalation attempts

Network Indicators:

  • Not applicable - local access vulnerability

SIEM Query:

source="oneapi" AND ("..\" OR "../" OR "path traversal")

🔗 References

📤 Share & Export