CVE-2023-50197

Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to write a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21845.
Configurations

Configuration 1 (hide)

cpe:2.3:a:intel:driver_\&_support_assistant:23.3.25.6:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-05-03 03:16

Updated : 2025-08-14 15:59


NVD link : CVE-2023-50197

Mitre link : CVE-2023-50197

CVE.ORG link : CVE-2023-50197


JSON object : View

Products Affected

intel

  • driver_\&_support_assistant
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')