Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31073: Escalation of Privilege in Intel(R) oneAPI Level Zero software

0
Medium
VulnerabilityCVE-2024-31073cvecve-2024-31073
Published: Tue May 13 2025 (05/13/2025, 21:02:59 UTC)
Source: CVE
Vendor/Project: n/a
Product: Intel(R) oneAPI Level Zero software

Description

Uncontrolled search path for some Intel(R) oneAPI Level Zero software may allow an authenticated user to potentially enable escalation of privilege via local access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:18:32 UTC

Technical Analysis

CVE-2024-31073 is a vulnerability identified in Intel oneAPI Level Zero software, a low-level programming interface designed for heterogeneous computing platforms. The flaw involves an uncontrolled search path, meaning the software does not securely validate or restrict the directories it searches for required resources or libraries. This can allow an authenticated user with limited privileges to influence the search path by placing malicious files or libraries in locations that the software will load, potentially leading to escalation of privilege. The vulnerability requires local access and some user interaction, with a high attack complexity, indicating that exploitation is not trivial but feasible under certain conditions. The CVSS 4.0 score of 5.4 reflects a medium severity, considering the need for authentication and user interaction, but also the high impact on confidentiality, integrity, and availability if exploited. No public exploits have been reported yet, but the vulnerability is recognized and published by Intel and CISA, indicating the importance of addressing it. The affected versions are not explicitly listed here but are referenced in official advisories. This vulnerability highlights the risks inherent in software that does not properly control its resource loading paths, which can be abused to execute unauthorized code or escalate privileges on affected systems.

Potential Impact

If exploited, this vulnerability could allow a low-privileged authenticated user to escalate their privileges on a system running Intel oneAPI Level Zero software. This could lead to unauthorized access to sensitive data, modification of system configurations, or execution of arbitrary code with higher privileges. For organizations relying on Intel oneAPI for development or production environments, especially those using heterogeneous computing resources, this could compromise system integrity and confidentiality. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in environments where multiple users have access or where attackers can gain initial footholds. The vulnerability could be leveraged in multi-user systems, development workstations, or cloud environments utilizing Intel oneAPI, potentially facilitating lateral movement or privilege escalation within networks.

Mitigation Recommendations

Organizations should monitor Intel's official advisories and apply patches or updates as soon as they become available to address CVE-2024-31073. Until patches are released, administrators should enforce strict environment controls, including limiting write permissions to directories involved in the software's search path and validating the integrity of files and libraries loaded by Intel oneAPI Level Zero software. Employing application whitelisting and restricting user permissions can reduce the risk of exploitation. Additionally, auditing and monitoring local user activities for suspicious behavior related to file placement or execution can help detect attempts to exploit this vulnerability. Segmentation of user privileges and minimizing the number of users with local access to systems running the affected software will further reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
intel
Date Reserved
2024-04-10T03:00:08.299Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec78e

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 2/26/2026, 8:18:32 PM

Last updated: 3/26/2026, 1:54:48 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses