{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-23569","assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","state":"PUBLISHED","assignerShortName":"intel","dateReserved":"2023-02-01T04:00:02.660Z","datePublished":"2023-05-10T13:16:41.468Z","dateUpdated":"2025-01-27T18:10:56.824Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel","dateUpdated":"2023-05-10T13:16:41.468Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"escalation of privilege"},{"lang":"en","description":"Stack-based buffer overflow","cweId":"CWE-121","type":"CWE"}]}],"affected":[{"vendor":"n/a","product":"Intel(R) Trace Analyzer and Collector software","versions":[{"version":"before version 2021.8.0 published Dec 2022","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Stack-based buffer overflow for some Intel(R) Trace Analyzer and Collector software before version 2021.8.0 published Dec 2022 may allow an authenticated user to potentially enable escalation of privilege via local access."}],"references":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T10:35:33.405Z"},"title":"CVE Program Container","references":[{"name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-27T17:28:44.456245Z","id":"CVE-2023-23569","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-27T18:10:56.824Z"}}]}}