{"api_version":"1","generated_at":"2026-04-22T17:48:19+00:00","cve":"CVE-2023-23569","urls":{"html":"https://cve.report/CVE-2023-23569","api":"https://cve.report/api/cve/CVE-2023-23569.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-23569","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-23569"},"summary":{"title":"CVE-2023-23569","description":"Stack-based buffer overflow for some Intel(R) Trace Analyzer and Collector software before version 2021.8.0 published Dec 2022 may allow an authenticated user to potentially enable escalation of privilege via local access.","state":"PUBLIC","assigner":"secure@intel.com","published_at":"2023-05-10 14:15:00","updated_at":"2023-11-07 04:07:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html","refsource":"MISC","tags":[],"title":"INTEL-SA-00805","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-23569","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23569","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"23569","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"oneapi_hpc_toolkit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"23569","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"intel","cpe5":"trace_analyzer_and_collector","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-23569","ASSIGNER":"secure@intel.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Stack-based buffer overflow for some Intel(R) Trace Analyzer and Collector software before version 2021.8.0 published Dec 2022 may allow an authenticated user to potentially enable escalation of privilege via local access."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"escalation of privilege"},{"lang":"eng","value":"Stack-based buffer overflow","cweId":"CWE-121"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Intel(R) Trace Analyzer and Collector software","version":{"version_data":[{"version_affected":"=","version_value":"before version 2021.8.0 published Dec 2022"}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html","refsource":"MISC","name":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html"}]},"impact":{"cvss":[{"version":"3.1","baseScore":7.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}]}},"nvd":{"publishedDate":"2023-05-10 14:15:00","lastModifiedDate":"2023-11-07 04:07:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:trace_analyzer_and_collector:*:*:*:*:*:*:*:*","versionEndExcluding":"2021.8.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:intel:oneapi_hpc_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"2023.0.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}