CVE-2023-50197

Intel Driver & Support Assistant Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Intel Driver & Support Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DSA Service. By creating a symbolic link, an attacker can abuse the service to write a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21845.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:intel:driver_\&_support_assistant:23.3.25.6:*:*:*:*:*:*:*

History

14 Aug 2025, 15:59

Type Values Removed Values Added
First Time Intel driver \& Support Assistant
Intel
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1773/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1773/ - Third Party Advisory
CPE cpe:2.3:a:intel:driver_\&_support_assistant:23.3.25.6:*:*:*:*:*:*:*

03 May 2024, 03:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 03:16

Updated : 2025-08-14 15:59


NVD link : CVE-2023-50197

Mitre link : CVE-2023-50197


JSON object : View

Products Affected

intel

  • driver_\&_support_assistant
CWE

No CWE.