HIGH · 8.3

CVE-2022-26843

Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthen...

Vulnerability Description

Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

CVSS Score

8.3

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
IntelOneapi Dpc\+\+\/C\+\+ Compiler< 2022.1
IntelOneapi Toolkits< 2022.2

References

FAQ

What is CVE-2022-26843?

CVE-2022-26843 is a vulnerability with a CVSS score of 8.3 (HIGH). Insufficient visual distinction of homoglyphs presented to user in the Intel(R) oneAPI DPC++/C++ Compiler before version 2022.1 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthen...

How severe is CVE-2022-26843?

CVE-2022-26843 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-26843?

Check the references section above for vendor advisories and patch information. Affected products include: Intel Oneapi Dpc\+\+\/C\+\+ Compiler, Intel Oneapi Toolkits.