Vulnerability Description
Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intel | Oneapi Dpc\+\+\/C\+\+ Compiler | < 2022.1 |
| Intel | Oneapi Toolkits | < 2022.2 |
References
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.hVendor Advisory
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.hVendor Advisory
FAQ
What is CVE-2022-26843?
CVE-2022-26843 is a vulnerability with a CVSS score of 8.3 (HIGH). Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthen...
How severe is CVE-2022-26843?
CVE-2022-26843 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-26843?
Check the references section above for vendor advisories and patch information. Affected products include: Intel Oneapi Dpc\+\+\/C\+\+ Compiler, Intel Oneapi Toolkits.