Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-32647
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Improper access control in some Intel(R) XTU software before version 7.12.0.29 may allow an authenticated user to potentially enable escalation of privilege via local access.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Intel Extreme Tuning Utility 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Intel Extreme Tuning Utility是美国英特尔(Intel)公司的一款可提高CPU频率的软件。该软件除了支持针对CPU、显卡超频外,还具有系统硬件信息检测、实时监控当前系统状态的功能,保证超频后的系统稳定性。 Intel Extreme Tuning Utility 7.12.0.29 版本之前存在安全漏洞,该漏洞源于受影响产品存在访问控制不当问题。可能导致经过身份验证的用户可能会通过本地访问实现权限升级。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-Intel(R) XTU software before version 7.12.0.29 -
II. Public POCs for CVE-2023-32647
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-32647
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-32647

No comments yet


Leave a comment