CVE-2023-42099

Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21846.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:intel:driver_\&_support_assistant:23.3.25.6:*:*:*:*:*:*:*

History

12 Aug 2025, 19:57

Type Values Removed Values Added
CPE cpe:2.3:a:intel:driver_\&_support_assistant:23.3.25.6:*:*:*:*:*:*:*
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1449/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1449/ - Third Party Advisory
First Time Intel driver \& Support Assistant
Intel

03 May 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 03:15

Updated : 2025-08-12 19:57


NVD link : CVE-2023-42099

Mitre link : CVE-2023-42099


JSON object : View

Products Affected

intel

  • driver_\&_support_assistant
CWE

No CWE.