PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-5682 Intel CVE debrief

CVE-2017-5682 is a high-severity local privilege escalation issue in Intel’s PSET Application Install wrapper used by several Intel 2017 software lines. According to NVD, the flaw can allow a process to be launched with escalated privileges, and the CVSS vector indicates local access, low privileges, and user interaction are required.

Vendor
Intel
Product
CVE-2017-5682
CVSS
HIGH 7.3
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-28
Original CVE updated
2026-05-13
Advisory published
2017-02-28
Advisory updated
2026-05-13

Who should care

Organizations and developers using affected Intel 2017 products, especially Intel Parallel Studio XE, System Studio, VTune Amplifier, Inspector, Advisor, MPI Library, Trace Analyzer and Collector, IPP, Cryptography for IPP, MKL, DAAL, and TBB. Security teams should also care where these tools are installed on shared or developer workstations.

Technical summary

NVD classifies the issue with CVSS 3.0 vector CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H, which points to a local attack requiring low privileges and user interaction. The affected component is the Intel PSET Application Install wrapper, and Intel’s advisory and NVD list multiple 2017 product families as vulnerable before 2017 Update 2.

Defensive priority

High. The issue can enable local privilege escalation across a wide set of Intel developer and performance tooling, so remediation should be prioritized on systems where those products are installed.

Recommended defensive actions

  • Upgrade affected Intel products to 2017 Update 2 or later, or remove vulnerable versions where they are no longer needed.
  • Inventory endpoints and developer systems for the listed Intel 2017 products referenced in the NVD CPE entries.
  • Restrict local interactive access on systems running affected software, especially shared workstations and build hosts.
  • Monitor for unexpected elevated process launches associated with Intel installation or wrapper components.
  • Validate remediation against Intel’s advisory INTEL-SA-00070 and the NVD record for CVE-2017-5682.

Evidence notes

This debrief is based on the CVE record, NVD metadata, and the Intel advisory reference listed in the source corpus. The corpus states that Intel PSET Application Install wrapper in multiple Intel products before 2017 Update 2 allows an attacker to launch a process with escalated privileges. The NVD vector shows local, low-privilege, user-interaction requirements. No exploit details were provided in the source corpus.

Official resources

The CVE was published on 2017-02-28. The supplied NVD record was modified on 2026-05-13, but that is a metadata update date and not the vulnerability’s original disclosure date.