Vulnerabilites related to eset - internet_security
cve-2021-37851
Vulnerability from cvelistv5
Published
2022-05-11 14:08
Modified
2024-09-16 22:51
Severity ?
EPSS score ?
Summary
Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
References
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca8268 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ESET, spol. s r.o. | ESET NOD32 Antivirus |
Version: 11.2 < 15.1.12.0 |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:08.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.eset.com/en/ca8268" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESET NOD32 Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "15.1.12.0", "status": "affected", "version": "11.2", "versionType": "custom" } ] }, { "product": "ESET Internet Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "15.1.12.0", "status": "affected", "version": "11.2", "versionType": "custom" } ] }, { "product": "ESET Smart Security Premium", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "15.1.12.0", "status": "affected", "version": "11.2", "versionType": "custom" } ] }, { "product": "ESET Endpoint Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "changes": [ { "at": "8.1.2050.0", "status": "unaffected" }, { "at": "8.0.2053.0", "status": "unaffected" } ], "lessThan": "9.0.2046.0", "status": "affected", "version": "6.0", "versionType": "custom" } ] }, { "product": "ESET Endpoint Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "changes": [ { "at": "8.1.2050.0", "status": "unaffected" }, { "at": "8.0.2053.0", "status": "unaffected" } ], "lessThan": "9.0.2046.0", "status": "affected", "version": "6.0", "versionType": "custom" } ] }, { "product": "ESET Server Security for Microsoft Windows Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "9.0.12012.0", "status": "affected", "version": "8.0", "versionType": "custom" } ] }, { "product": "ESET File Security for Microsoft Windows Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "affected", "version": "6.0 8.0.12013.0" } ] }, { "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "8.0.10020.0", "status": "affected", "version": "6.0", "versionType": "custom" } ] }, { "product": "ESET Mail Security for IBM Domino", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "8.0.14011.0", "status": "affected", "version": "6.0", "versionType": "custom" } ] }, { "product": "ESET Security for Microsoft SharePoint Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "8.0.15009.0", "status": "affected", "version": "6.0", "versionType": "custom" } ] } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T14:08:03", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.eset.com/en/ca8268" } ], "source": { "advisory": "ca8268", "discovery": "EXTERNAL" }, "title": "Local Privilege Escalation in ESET product for Windows", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@eset.com", "DATE_PUBLIC": "2022-05-09T13:00:00.000Z", "ID": "CVE-2021-37851", "STATE": "PUBLIC", "TITLE": "Local Privilege Escalation in ESET product for Windows" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESET NOD32 Antivirus", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "11.2", "version_value": "15.1.12.0" } ] } }, { "product_name": "ESET Internet Security", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "11.2", "version_value": "15.1.12.0" } ] } }, { "product_name": "ESET Smart Security Premium", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "11.2", "version_value": "15.1.12.0" } ] } }, { "product_name": "ESET Endpoint Antivirus", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0", "version_value": "9.0.2046.0" }, { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.1.2050.0" }, { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.0.2053.0" } ] } }, { "product_name": "ESET Endpoint Security", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0", "version_value": "9.0.2046.0" }, { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.1.2050.0" }, { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.0.2053.0" } ] } }, { "product_name": "ESET Server Security for Microsoft Windows Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.0", "version_value": "9.0.12012.0" } ] } }, { "product_name": "ESET File Security for Microsoft Windows Server", "version": { "version_data": [ { "version_name": "6.0", "version_value": "8.0.12013.0" } ] } }, { "product_name": "ESET Mail Security for Microsoft Exchange Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.0.10020.0" } ] } }, { "product_name": "ESET Mail Security for IBM Domino", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.0.14011.0" } ] } }, { "product_name": "ESET Security for Microsoft SharePoint Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.0.15009.0" } ] } } ] }, "vendor_name": "ESET, spol. s r.o." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-280 Improper Handling of Insufficient Permissions or Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.eset.com/en/ca8268", "refsource": "MISC", "url": "https://support.eset.com/en/ca8268" } ] }, "source": { "advisory": "ca8268", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2021-37851", "datePublished": "2022-05-11T14:08:03.466440Z", "dateReserved": "2021-08-02T00:00:00", "dateUpdated": "2024-09-16T22:51:23.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5594
Vulnerability from cvelistv5
Published
2023-12-21 11:30
Modified
2024-08-02 08:07
Severity ?
EPSS score ?
Summary
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:32.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET NOD32 Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Internet Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Smart Security Premium", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Security Ultimate", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Endpoint Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Endpoint Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Endpoint Antivirus for Linux 10.0 and above", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Server Security for Windows Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Mail Security for IBM Domino", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Security for Microsoft SharePoint Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET File Security for Microsoft Azure", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] }, { "defaultStatus": "unaffected", "modules": [ "Internet protection module" ], "product": "ESET Server Security for Linux 10.1 and above ", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1464" } ] } ], "datePublic": "2023-12-20T11:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper validation of the server\u2019s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted." } ], "value": "Improper validation of the server\u2019s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted." } ], "impacts": [ { "capecId": "CAPEC-94", "descriptions": [ { "lang": "en", "value": "CAPEC-94 Man in the Middle Attack" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-21T11:30:41.256Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed" } ], "source": { "advisory": "ca8562", "discovery": "UNKNOWN" }, "title": "Improper following of a certificate\u0027s chain of trust\u202fin ESET security products", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2023-5594", "datePublished": "2023-12-21T11:30:41.256Z", "dateReserved": "2023-10-16T08:12:50.985Z", "dateUpdated": "2024-08-02T08:07:32.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-7043
Vulnerability from cvelistv5
Published
2024-01-31 12:51
Modified
2024-10-17 17:54
Severity ?
EPSS score ?
Summary
Unquoted service path in ESET products allows to
drop a prepared program to a specific location and run on boot with the
NT AUTHORITY\NetworkService permissions.
References
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca8602 |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ESET, spol. s r.o. | ESET Endpoint Security |
Version: 10.1.2046.x < |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:50:07.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.eset.com/en/ca8602" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-7043", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-31T15:52:23.258496Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T17:54:28.120Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ESET Endpoint Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "10.1.2063.x", "status": "affected", "version": "10.1.2046.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Endpoint Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "10.1.2063.x", "status": "affected", "version": "10.1.2046.x", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET NOD32 Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "16.1.14.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Internet Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "16.1.14.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Smart Security Premium", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "16.1.14.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "affected", "version": "10.1.10012.0" } ] } ], "datePublic": "2024-01-26T11:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unquoted service path in ESET products allows to \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003edrop a prepared program to a specific location\u003c/span\u003e\u0026nbsp;and\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003erun on boot with \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ethe \n\nNT AUTHORITY\\NetworkService\u0026nbsp;permissions.\u003c/span\u003e" } ], "value": "Unquoted service path in ESET products allows to \n\ndrop a prepared program to a specific location\u00a0and\u00a0run on boot with the \n\nNT AUTHORITY\\NetworkService\u00a0permissions." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-428", "description": "CWE-428 Unquoted Search Path or Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-31T12:52:10.301Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://support.eset.com/en/ca8602" } ], "source": { "advisory": "ca8602", "discovery": "UNKNOWN" }, "title": "Unquoted path privilege vulnerability in ESET products for Windows", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2023-7043", "datePublished": "2024-01-31T12:51:38.253Z", "dateReserved": "2023-12-21T12:14:56.731Z", "dateUpdated": "2024-10-17T17:54:28.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10193
Vulnerability from cvelistv5
Published
2020-03-06 19:26
Modified
2024-08-04 10:58
Severity ?
EPSS score ?
Summary
ESET Archive Support Module before 1294 allows virus-detection bypass via crafted RAR Compression Information in an archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop.
References
▼ | URL | Tags |
---|---|---|
https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:58:39.025Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "ESET Archive Support Module before 1294 allows virus-detection bypass via crafted RAR Compression Information in an archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-06T19:26:05", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10193", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ESET Archive Support Module before 1294 allows virus-detection bypass via crafted RAR Compression Information in an archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html", "refsource": "MISC", "url": "https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10193", "datePublished": "2020-03-06T19:26:05", "dateReserved": "2020-03-06T00:00:00", "dateUpdated": "2024-08-04T10:58:39.025Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11446
Vulnerability from cvelistv5
Published
2020-04-29 13:15
Modified
2024-08-04 11:28
Severity ?
EPSS score ?
Summary
ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation.
References
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca7489-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:28:14.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.eset.com/en/ca7489-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-29T13:15:49", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.eset.com/en/ca7489-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11446", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.eset.com/en/ca7489-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows", "refsource": "CONFIRM", "url": "https://support.eset.com/en/ca7489-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11446", "datePublished": "2020-04-29T13:15:49", "dateReserved": "2020-04-01T00:00:00", "dateUpdated": "2024-08-04T11:28:14.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3779
Vulnerability from cvelistv5
Published
2024-07-16 08:17
Modified
2024-08-01 20:20
Severity ?
EPSS score ?
Summary
Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met.
References
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca8688 |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ESET s.r.o | ESET NOD32 Antivirus |
Version: 0 < |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3779", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T13:10:29.360811Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T13:10:35.421Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:01.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.eset.com/en/ca8688" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ESET NOD32 Antivirus", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "17.1.13.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Internet Security", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "17.1.13.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Smart Security Premium", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "17.1.13.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Security Ultimate", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "17.1.13.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Endpoint Antivirus for Windows", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "11.0.2044.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Endpoint Security for Windows", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "11.0.2044.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Server Security for Windows Server", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "11.0.12011.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "11.0.10005.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Mail Security for IBM Domino", "vendor": "ESET s.r.o", "versions": [ { "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Security for Microsoft SharePoint Server", "vendor": "ESET s.r.o", "versions": [ { "lessThanOrEqual": "11.0.15002.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2024-07-12T10:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met." } ], "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met." } ], "impacts": [ { "capecId": "CAPEC-578", "descriptions": [ { "lang": "en", "value": "CAPEC-578 Disable Security Software" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-16T08:17:59.962Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://support.eset.com/en/ca8688" } ], "source": { "advisory": "ca8688", "discovery": "UNKNOWN" }, "title": "Denial of Service in ESET products for Windows", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2024-3779", "datePublished": "2024-07-16T08:17:59.962Z", "dateReserved": "2024-04-15T07:03:57.841Z", "dateUpdated": "2024-08-01T20:20:01.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3160
Vulnerability from cvelistv5
Published
2023-08-14 09:27
Modified
2024-10-09 20:04
Severity ?
EPSS score ?
Summary
The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.
References
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca8466 |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ESET, spol. s r.o. | ESET NOD32 Antivirus | ||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:48:07.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.eset.com/en/ca8466" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3160", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T20:03:59.300075Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T20:04:15.607Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET NOD32 Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Internet Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Smart Security Premium", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Endpoint Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Endpoint Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Server Security for Windows Server (File Security)", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Mail Security for IBM Domino", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] }, { "defaultStatus": "unaffected", "modules": [ "HIPS" ], "product": "ESET Security for Microsoft SharePoint Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "unaffected", "version": "1463" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nThe vulnerability potentially allows an attacker to misuse ESET\u2019s file operations during the module update to delete or move files without having proper permissions." } ], "value": "\nThe vulnerability potentially allows an attacker to misuse ESET\u2019s file operations during the module update to delete or move files without having proper permissions." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-14T09:27:02.427Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://support.eset.com/en/ca8466" } ], "source": { "advisory": "ca8466", "discovery": "EXTERNAL" }, "title": "Local privilege escalation in security products for Windows", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2023-3160", "datePublished": "2023-08-14T09:27:02.427Z", "dateReserved": "2023-06-08T08:28:28.513Z", "dateUpdated": "2024-10-09T20:04:15.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37852
Vulnerability from cvelistv5
Published
2022-02-09 05:14
Modified
2024-09-16 23:02
Severity ?
EPSS score ?
Summary
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
References
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-148/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ESET | ESET NOD32 Antivirus |
Version: 10.0.337.1 < |
|||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:30:09.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESET NOD32 Antivirus", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "15.0.18.0", "status": "affected", "version": "10.0.337.1", "versionType": "custom" } ] }, { "product": "ESET Internet Security", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "15.0.18.0", "status": "affected", "version": "10.0.337.1", "versionType": "custom" } ] }, { "product": "ESET Smart Security", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "15.0.18.0", "status": "affected", "version": "10.0.337.1", "versionType": "custom" } ] }, { "product": "ESET Endpoint Antivirus for Windows", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "9.0.2032.4", "status": "affected", "version": "6.6.2046.0", "versionType": "custom" } ] }, { "product": "ESET Endpoint Security for Windows", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "9.0.2032.4", "status": "affected", "version": "6.6.2046.0", "versionType": "custom" } ] }, { "product": "ESET Server Security for Microsoft Windows Server", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "8.0.12003.1", "status": "affected", "version": "8.0.12003.0", "versionType": "custom" } ] }, { "product": "ESET File Security for Microsoft Windows Server", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "7.3.12006.0", "status": "affected", "version": "7.0.12014.0", "versionType": "custom" } ] }, { "product": "ESET Server Security for Microsoft Azure", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "7.2.12004.1000", "status": "affected", "version": "7.0.12016.1002", "versionType": "custom" } ] }, { "product": "ESET Security for Microsoft SharePoint Server", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "8.0.15004.0", "status": "affected", "version": "7.0.15008.0", "versionType": "custom" } ] }, { "product": "ESET Mail Security for IBM Domino", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "8.0.14004.0", "status": "affected", "version": "7.0.14008.0", "versionType": "custom" } ] }, { "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET", "versions": [ { "lessThanOrEqual": "8.0.10016.0", "status": "affected", "version": "7.0.10019", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative" } ], "datePublic": "2022-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T05:14:13", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/" } ], "source": { "advisory": "CA8223", "discovery": "EXTERNAL" }, "title": "LPE in ESET products for Windows", "workarounds": [ { "lang": "en", "value": "The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in ESET products\u00e2\u20ac\u2122 Advanced setup.\n\nHowever, ESET strongly recommends performing an upgrade to a fixed product version and only applying this workaround when the upgrade is not possible for an important reason." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@eset.com", "DATE_PUBLIC": "2022-01-31T09:00:00.000Z", "ID": "CVE-2021-37852", "STATE": "PUBLIC", "TITLE": "LPE in ESET products for Windows" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESET NOD32 Antivirus", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "10.0.337.1", "version_value": "15.0.18.0" } ] } }, { "product_name": "ESET Internet Security", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "10.0.337.1", "version_value": "15.0.18.0" } ] } }, { "product_name": "ESET Smart Security", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "10.0.337.1", "version_value": "15.0.18.0" } ] } }, { "product_name": "ESET Endpoint Antivirus for Windows", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "6.6.2046.0", "version_value": "9.0.2032.4" } ] } }, { "product_name": "ESET Endpoint Security for Windows", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "6.6.2046.0", "version_value": "9.0.2032.4" } ] } }, { "product_name": "ESET Server Security for Microsoft Windows Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "8.0.12003.0", "version_value": "8.0.12003.1" } ] } }, { "product_name": "ESET File Security for Microsoft Windows Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.12014.0", "version_value": "7.3.12006.0" } ] } }, { "product_name": "ESET Server Security for Microsoft Azure", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.12016.1002", "version_value": "7.2.12004.1000" } ] } }, { "product_name": "ESET Security for Microsoft SharePoint Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.15008.0", "version_value": "8.0.15004.0" } ] } }, { "product_name": "ESET Mail Security for IBM Domino", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.14008.0", "version_value": "8.0.14004.0" } ] } }, { "product_name": "ESET Mail Security for Microsoft Exchange Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.10019", "version_value": "8.0.10016.0" } ] } } ] }, "vendor_name": "ESET" } ] } }, "credit": [ { "lang": "eng", "value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows", "refsource": "MISC", "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/" } ] }, "source": { "advisory": "CA8223", "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in ESET products\u00e2\u20ac\u2122 Advanced setup.\n\nHowever, ESET strongly recommends performing an upgrade to a fixed product version and only applying this workaround when the upgrade is not possible for an important reason." } ] } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2021-37852", "datePublished": "2022-02-09T05:14:13.627605Z", "dateReserved": "2021-08-02T00:00:00", "dateUpdated": "2024-09-16T23:02:00.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9264
Vulnerability from cvelistv5
Published
2020-02-18 14:56
Modified
2024-08-04 10:26
Severity ?
EPSS score ?
Summary
ESET Archive Support Module before 1296 allows virus-detection bypass via a crafted Compression Information Field in a ZIP archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop.
References
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca7387-modules-review-december-2019 | x_refsource_MISC | |
https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2020/Feb/21 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:26:14.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.eset.com/en/ca7387-modules-review-december-2019" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html" }, { "name": "20200218 Re: [TZO-03-2020] ESET Generic Malformed Archive Bypass (ZIP Compression Information)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/21" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "ESET Archive Support Module before 1296 allows virus-detection bypass via a crafted Compression Information Field in a ZIP archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-18T18:06:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.eset.com/en/ca7387-modules-review-december-2019" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html" }, { "name": "20200218 Re: [TZO-03-2020] ESET Generic Malformed Archive Bypass (ZIP Compression Information)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/21" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-9264", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ESET Archive Support Module before 1296 allows virus-detection bypass via a crafted Compression Information Field in a ZIP archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.eset.com/en/ca7387-modules-review-december-2019", "refsource": "MISC", "url": "https://support.eset.com/en/ca7387-modules-review-december-2019" }, { "name": "https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html", "refsource": "MISC", "url": "https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html" }, { "name": "20200218 Re: [TZO-03-2020] ESET Generic Malformed Archive Bypass (ZIP Compression Information)", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Feb/21" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-9264", "datePublished": "2020-02-18T14:56:52", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:26:14.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26941
Vulnerability from cvelistv5
Published
2021-01-21 14:35
Modified
2024-08-04 16:03
Severity ?
EPSS score ?
Summary
A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:03:22.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.eset.com/en/ca7794-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-21T14:35:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.eset.com/en/ca7794-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26941", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.eset.com/en/ca7794-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows", "refsource": "MISC", "url": "https://support.eset.com/en/ca7794-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26941", "datePublished": "2021-01-21T14:35:19", "dateReserved": "2020-10-10T00:00:00", "dateUpdated": "2024-08-04T16:03:22.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27167
Vulnerability from cvelistv5
Published
2022-05-10 19:43
Modified
2024-09-16 21:56
Severity ?
EPSS score ?
Summary
Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
References
▼ | URL | Tags |
---|---|---|
https://support.eset.com/en/ca8268 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ESET, spol. s r.o. | ESET NOD32 Antivirus |
Version: 11.2 < 15.1.12.0 |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:18:39.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.eset.com/en/ca8268" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ESET NOD32 Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "15.1.12.0", "status": "affected", "version": "11.2", "versionType": "custom" } ] }, { "product": "ESET Internet Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "15.1.12.0", "status": "affected", "version": "11.2", "versionType": "custom" } ] }, { "product": "ESET Smart Security Premium", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "15.1.12.0", "status": "affected", "version": "11.2", "versionType": "custom" } ] }, { "product": "ESET Endpoint Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "changes": [ { "at": "8.1.2050.0", "status": "unaffected" }, { "at": "8.0.2053.0", "status": "unaffected" } ], "lessThan": "9.0.2046.0", "status": "affected", "version": "6.0", "versionType": "custom" } ] }, { "product": "ESET Endpoint Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "changes": [ { "at": "8.1.2050.0", "status": "unaffected" }, { "at": "8.0.2053.0", "status": "unaffected" } ], "lessThan": "9.0.2046.0", "status": "affected", "version": "6.0", "versionType": "custom" } ] }, { "product": "ESET Server Security for Microsoft Windows Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "9.0.12012.0", "status": "affected", "version": "8.0", "versionType": "custom" } ] }, { "product": "ESET File Security for Microsoft Windows Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "status": "affected", "version": "6.0 8.0.12013.0" } ] }, { "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "8.0.10020.0", "status": "affected", "version": "6.0", "versionType": "custom" } ] }, { "product": "ESET Mail Security for IBM Domino", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "8.0.14011.0", "status": "affected", "version": "6.0", "versionType": "custom" } ] }, { "product": "ESET Security for Microsoft SharePoint Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThan": "8.0.15009.0", "status": "affected", "version": "6.0", "versionType": "custom" } ] } ], "datePublic": "2022-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit \"Repair\" and \"Uninstall\" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T19:43:59", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.eset.com/en/ca8268" } ], "source": { "advisory": "ca8268", "discovery": "EXTERNAL" }, "title": "Arbitrary File Deletion in ESET products for Windows", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@eset.com", "DATE_PUBLIC": "2022-05-09T13:00:00.000Z", "ID": "CVE-2022-27167", "STATE": "PUBLIC", "TITLE": "Arbitrary File Deletion in ESET products for Windows" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ESET NOD32 Antivirus", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "11.2", "version_value": "15.1.12.0" } ] } }, { "product_name": "ESET Internet Security", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "11.2", "version_value": "15.1.12.0" } ] } }, { "product_name": "ESET Smart Security Premium", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "11.2", "version_value": "15.1.12.0" } ] } }, { "product_name": "ESET Endpoint Antivirus", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0", "version_value": "9.0.2046.0" }, { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.1.2050.0" }, { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.0.2053.0" } ] } }, { "product_name": "ESET Endpoint Security", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0", "version_value": "9.0.2046.0" }, { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.1.2050.0" }, { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.0.2053.0" } ] } }, { "product_name": "ESET Server Security for Microsoft Windows Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.0", "version_value": "9.0.12012.0" } ] } }, { "product_name": "ESET File Security for Microsoft Windows Server", "version": { "version_data": [ { "version_name": "6.0", "version_value": "8.0.12013.0" } ] } }, { "product_name": "ESET Mail Security for Microsoft Exchange Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.0.10020.0" } ] } }, { "product_name": "ESET Mail Security for IBM Domino", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.0.14011.0" } ] } }, { "product_name": "ESET Security for Microsoft SharePoint Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.0", "version_value": "8.0.15009.0" } ] } } ] }, "vendor_name": "ESET, spol. s r.o." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit \"Repair\" and \"Uninstall\" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-280 Improper Handling of Insufficient Permissions or Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.eset.com/en/ca8268", "refsource": "MISC", "url": "https://support.eset.com/en/ca8268" } ] }, "source": { "advisory": "ca8268", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2022-27167", "datePublished": "2022-05-10T19:43:59.570695Z", "dateReserved": "2022-03-14T00:00:00", "dateUpdated": "2024-09-16T21:56:50.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0649
Vulnerability from cvelistv5
Published
2018-09-07 14:00
Modified
2024-08-05 03:35
Severity ?
EPSS score ?
Summary
Untrusted search path vulnerability in the installers of multiple Canon IT Solutions Inc. software programs (ESET Smart Security Premium, ESET Internet Security, ESET Smart Security, ESET NOD32 Antivirus, DESlock+ Pro, and CompuSec (all programs except packaged ones)) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
References
▼ | URL | Tags |
---|---|---|
http://jvn.jp/en/jp/JVN41452671/index.html | third-party-advisory, x_refsource_JVN | |
https://eset-support.canon-its.jp/faq/show/10720?site_domain=default | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Canon IT Solutions Inc. | The installers of multiple Canon IT Solutions Inc. software programs |
Version: (ESET Smart Security Premium, ESET Internet Security, ESET Smart Security, ESET NOD32 Antivirus, DESlock+ Pro, and CompuSec (all programs except packaged ones)) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:35:48.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#41452671", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN41452671/index.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://eset-support.canon-its.jp/faq/show/10720?site_domain=default" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "The installers of multiple Canon IT Solutions Inc. software programs", "vendor": "Canon IT Solutions Inc.", "versions": [ { "status": "affected", "version": "(ESET Smart Security Premium, ESET Internet Security, ESET Smart Security, ESET NOD32 Antivirus, DESlock+ Pro, and CompuSec (all programs except packaged ones))" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in the installers of multiple Canon IT Solutions Inc. software programs (ESET Smart Security Premium, ESET Internet Security, ESET Smart Security, ESET NOD32 Antivirus, DESlock+ Pro, and CompuSec (all programs except packaged ones)) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." } ], "problemTypes": [ { "descriptions": [ { "description": "Untrusted search path vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-07T13:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVN#41452671", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN41452671/index.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://eset-support.canon-its.jp/faq/show/10720?site_domain=default" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2018-0649", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "The installers of multiple Canon IT Solutions Inc. software programs", "version": { "version_data": [ { "version_value": "(ESET Smart Security Premium, ESET Internet Security, ESET Smart Security, ESET NOD32 Antivirus, DESlock+ Pro, and CompuSec (all programs except packaged ones))" } ] } } ] }, "vendor_name": "Canon IT Solutions Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in the installers of multiple Canon IT Solutions Inc. software programs (ESET Smart Security Premium, ESET Internet Security, ESET Smart Security, ESET NOD32 Antivirus, DESlock+ Pro, and CompuSec (all programs except packaged ones)) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Untrusted search path vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#41452671", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN41452671/index.html" }, { "name": "https://eset-support.canon-its.jp/faq/show/10720?site_domain=default", "refsource": "CONFIRM", "url": "https://eset-support.canon-its.jp/faq/show/10720?site_domain=default" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2018-0649", "datePublished": "2018-09-07T14:00:00", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-08-05T03:35:48.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0353
Vulnerability from cvelistv5
Published
2024-02-15 07:40
Modified
2024-11-25 18:15
Severity ?
EPSS score ?
Summary
Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ESET, spol. s r.o. | ESET NOD32 Antivirus |
Version: 0 < |
|||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-11-25T18:15:23.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html" }, { "url": "https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html" }, { "tags": [ "x_transferred" ], "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } }, { "affected": [ { "cpes": [ "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nod32_antivirus", "vendor": "eset", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "internet_security", "vendor": "eset", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:eset:smart_security_premium:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "smart_security_premium", "vendor": "eset", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:eset:security_ultimate:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "security_ultimate", "vendor": "eset", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "endpoint_antivirus", "vendor": "eset", "versions": [ { "lessThanOrEqual": "10.1.2058.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "endpoint_security", "vendor": "eset", "versions": [ { "lessThanOrEqual": "10.1.2058.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:*" ], "defaultStatus": "unknown", "product": "server_security", "vendor": "eset", "versions": [ { "lessThanOrEqual": "10.0.12014.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:*" ], "defaultStatus": "unknown", "product": "mail_security", "vendor": "eset", "versions": [ { "lessThanOrEqual": "10.1.10010.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*" ], "defaultStatus": "unknown", "product": "mail_security", "vendor": "eset", "versions": [ { "lessThanOrEqual": "10.0.14006.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:*" ], "defaultStatus": "unknown", "product": "security", "vendor": "eset", "versions": [ { "lessThanOrEqual": "10.0.15004.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:eset:file_security:-:*:*:*:*:azure:*:*" ], "defaultStatus": "unknown", "product": "file_security", "vendor": "eset", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-0353", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T19:22:48.853538Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T19:53:00.534Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ESET NOD32 Antivirus", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Internet Security", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Smart Security Premium", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Security Ultimate", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "16.2.15.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Endpoint Antivirus for Windows", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "10.1.2058.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "10.0.2049.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "9.1.2066.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "8.1.2052.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Endpoint Security for Windows", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "10.1.2058.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "10.0.2049.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "9.1.2066.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "8.1.2052.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Server Security for Windows Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "10.0.12014.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "9.0.12018.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "8.0.12015.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "7.3.12011.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Mail Security for Microsoft Exchange Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "10.1.10010.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "10.0.10017.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "9.0.10011.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "8.0.10022.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "7.3.10014.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Mail Security for IBM Domino", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "10.0.14006.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "9.0.14007.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "8.0.14010.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "7.3.14004.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET Security for Microsoft SharePoint Server", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "10.0.15004.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "9.0.15005.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "8.0.15011.0", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "7.3.15004.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "ESET File Security for Microsoft Azure", "vendor": "ESET, spol. s r.o.", "versions": [ { "lessThanOrEqual": "all versions", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2024-02-14T11:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET\u2019s file operations to delete files without having proper permission." } ], "value": "Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET\u2019s file operations to delete files without having proper permission." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-15T07:40:24.786Z", "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "shortName": "ESET" }, "references": [ { "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed" } ], "source": { "advisory": "ca8612", "discovery": "UNKNOWN" }, "title": "Local privilege escalation in Windows products", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215", "assignerShortName": "ESET", "cveId": "CVE-2024-0353", "datePublished": "2024-02-15T07:40:24.786Z", "dateReserved": "2024-01-09T14:21:58.755Z", "dateUpdated": "2024-11-25T18:15:23.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-08-14 10:15
Modified
2024-11-21 08:16
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.
References
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8466 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8466 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | - | |
eset | endpoint_security | - | |
eset | internet_security | - | |
eset | mail_security | - | |
eset | mail_security | - | |
eset | nod32 | - | |
eset | security | - | |
eset | server_security | - | |
eset | smart_security | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:-:*:*", "matchCriteriaId": "2B76C798-A8F7-4705-B85A-98CE4C44AC53", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "81593DEE-54D7-49D5-9AE6-20B7E2B0AF8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CAD248-1F32-4459-A530-8706E334C67F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*", "matchCriteriaId": "5043B5B1-38B2-4621-B738-A79E5DF8D98E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "DE40A56E-EBC0-43C8-85FB-868802B4817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:-:*:*:*:*:*:*:*", "matchCriteriaId": "82540E3B-B426-424F-A6FD-C0AAB596389A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "D6CCDFB5-D27D-40F5-9BFC-274DA84783E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:*", "matchCriteriaId": "74BC745B-A4C5-4EAE-B985-78FDA3C40516", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:-:*:*:*:premium:*:*:*", "matchCriteriaId": "375F46B4-9FDF-48FB-935A-8BB6FEF5221A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nThe vulnerability potentially allows an attacker to misuse ESET\u2019s file operations during the module update to delete or move files without having proper permissions." } ], "id": "CVE-2023-3160", "lastModified": "2024-11-21T08:16:35.520", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-14T10:15:09.503", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8466" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-18 15:15
Modified
2024-11-21 05:40
Severity ?
Summary
ESET Archive Support Module before 1296 allows virus-detection bypass via a crafted Compression Information Field in a ZIP archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2020/Feb/21 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html | Third Party Advisory | |
cve@mitre.org | https://support.eset.com/en/ca7387-modules-review-december-2019 | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Feb/21 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca7387-modules-review-december-2019 | Release Notes |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | cyber_security | * | |
eset | cyber_security | * | |
eset | internet_security | * | |
eset | mobile_security | * | |
eset | nod32_antivirus | * | |
eset | nod32_antivirus | 4 | |
eset | smart_security | * | |
eset | smart_tv_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:cyber_security:*:*:*:*:*:macos:*:*", "matchCriteriaId": "5371D3C6-AB34-4535-BB2D-767EF3D74B8D", "versionEndExcluding": "1296", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:cyber_security:*:*:*:*:pro:macos:*:*", "matchCriteriaId": "6AB0EFCD-D718-422C-964E-8B87DD7ED448", "versionEndExcluding": "1296", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F6FA874-7D7F-4E56-9472-47A576F5E720", "versionEndExcluding": "1296", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mobile_security:*:*:*:*:*:android:*:*", "matchCriteriaId": "77734CD3-BE20-47C8-B2A5-86FEED181E79", "versionEndExcluding": "1296", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7537106-687B-4026-A4B6-AE9307FB2440", "versionEndExcluding": "1296", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:4:*:*:*:*:linux:*:*", "matchCriteriaId": "BCB077E5-6496-4FA9-A552-692A18B04287", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*", "matchCriteriaId": "3A4983DD-34FC-4A06-A875-AFD11C48DC94", "versionEndExcluding": "1296", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_tv_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7E99AF2-4ADD-4295-8D01-8AB2C998FD4C", "versionEndExcluding": "1296", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ESET Archive Support Module before 1296 allows virus-detection bypass via a crafted Compression Information Field in a ZIP archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop." }, { "lang": "es", "value": "ESET Archive Support Module versiones anteriores a 1296, permite omitir la detecci\u00f3n de virus por medio de un Compression Information Field dise\u00f1ado en un archivo ZIP. Esto afecta a las versiones anteriores a 1294 de Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security para Android, Smart TV Security y NOD32 Antivirus 4 para Linux Desktop." } ], "id": "CVE-2020-9264", "lastModified": "2024-11-21T05:40:18.097", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-18T15:15:12.787", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/21" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://support.eset.com/en/ca7387-modules-review-december-2019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://support.eset.com/en/ca7387-modules-review-december-2019" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-436" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 15:15
Modified
2024-11-21 06:15
Severity ?
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
References
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8268 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8268 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | file_security | * | |
eset | internet_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | nod32_antivirus | * | |
eset | security | * | |
eset | server_security | * | |
eset | server_security | * | |
eset | smart_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B3B4B09F-0A8D-433D-BEB0-95B1F71C4243", "versionEndExcluding": "8.0.2053.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "C1B57A00-9B42-46B7-AFE1-2DF41E3AD7C8", "versionEndExcluding": "8.1.2050.0", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9126E224-6F5B-4312-A268-25785D33D332", "versionEndExcluding": "9.0.2046.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "64320D36-E321-4AC5-B769-03B41FAF37DE", "versionEndExcluding": "8.0.2053.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0839107D-7843-4C27-B91F-33733CD3658D", "versionEndExcluding": "8.1.2050.0", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F47550A5-8416-44F4-8104-58FFB9F94EF5", "versionEndExcluding": "9.0.2046.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "0C0E8002-5140-494C-A890-E1D40E398F2C", "versionEndExcluding": "8.0.12013.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "90FE16A7-F332-48C0-B42B-612B481CCA50", "versionEndExcluding": "15.1.12.0", "versionStartIncluding": "11.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "33D85DF1-A33C-4445-AA40-E6DC181C455B", "versionEndExcluding": "8.0.10020.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "19005039-6B1F-4622-AA24-4428A8B69360", "versionEndExcluding": "8.0.14011.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "C39C1B8A-80FC-450B-BE04-2908389FC61C", "versionEndExcluding": "15.1.12.0", "versionStartIncluding": "11.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "9292F9CA-FD25-4BE1-AAB6-E1DC060EA66A", "versionEndExcluding": "8.0.15009.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:azure:*:*", "matchCriteriaId": "C34234B3-5AC3-4896-9F5F-57DABC8527F1", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "C98987B5-8F3F-4EE1-82EB-80F2620BD3A0", "versionEndExcluding": "9.0.12012.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*", "matchCriteriaId": "6E82A43A-0260-4038-8BF6-F39F8E9438B8", "versionEndExcluding": "15.1.12.0", "versionStartIncluding": "11.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0." }, { "lang": "es", "value": "Una escalada local de privilegios en los productos Windows de ESET permite al usuario que ha iniciado sesi\u00f3n en el sistema explotar la funcionalidad repair del instalador para ejecutar c\u00f3digo malicioso con privilegios superiores. Este problema afecta: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versiones anteriores a 9.0.2046.0; 6.0 versiones anteriores a 8.1.2050.0; 6.0 versiones anteriores a 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versiones anteriores a 9.0.2046.0; 6.0 versiones anteriores a 8.1.2050.0; 6.0 versiones anteriores a 8.0.2053.0. ESET, spol. s r.o. ESET Server Security para Microsoft Windows Server 8.0 versiones anteriores a 9.0.12012.0. ESET, spol. s r.o. ESET File Security para Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security para Microsoft Exchange Server 6.0 versiones anteriores a 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security para IBM Domino 6.0 versiones anteriores a 8.0.14011.0. ESET, spol. s r.o. ESET Security para Microsoft SharePoint Server 6.0 versiones anteriores a 8.0.15009.0" } ], "id": "CVE-2021-37851", "lastModified": "2024-11-21T06:15:58.627", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T15:15:08.487", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8268" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-280" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-21 12:15
Modified
2024-11-21 08:42
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Summary
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
References
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | - | |
eset | endpoint_security | - | |
eset | file_security | - | |
eset | internet_security | - | |
eset | mail_security | - | |
eset | mail_security | - | |
eset | nod32_antivirus | - | |
eset | security | - | |
eset | security | - | |
eset | server_security | * | |
eset | server_security | - | |
eset | smart_security | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:linux:*:*", "matchCriteriaId": "1B5C405E-3150-40F5-882D-C07A4955C996", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:windows:*:*", "matchCriteriaId": "439FC2E0-2FE4-4916-8E2C-119450608680", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:windows:*:*", "matchCriteriaId": "99F0D178-E466-461D-B404-D2958D12B1A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:file_security:-:*:*:*:*:azure:*:*", "matchCriteriaId": "207E6D02-A9FB-4B1F-ABEA-BEBDA67E31A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CAD248-1F32-4459-A530-8706E334C67F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*", "matchCriteriaId": "5043B5B1-38B2-4621-B738-A79E5DF8D98E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "DE40A56E-EBC0-43C8-85FB-868802B4817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6253FAFB-0AE6-494A-950D-EB0EB15E982C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "D6CCDFB5-D27D-40F5-9BFC-274DA84783E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:-:*:*:*:ultimate:*:*:*", "matchCriteriaId": "F86A88FA-CAB9-4937-AE8D-4FA22EF4D380", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:linux:*:*", "matchCriteriaId": "90DDE40D-605C-4465-A647-D3BD14B13E46", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:*", "matchCriteriaId": "74BC745B-A4C5-4EAE-B985-78FDA3C40516", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:-:*:*:*:premium:*:*:*", "matchCriteriaId": "375F46B4-9FDF-48FB-935A-8BB6FEF5221A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper validation of the server\u2019s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted." }, { "lang": "es", "value": "La validaci\u00f3n incorrecta de la cadena de certificados del servidor en la funci\u00f3n de escaneo de tr\u00e1fico seguro consider\u00f3 que el certificado intermedio firmado utilizando el algoritmo MD5 o SHA1 era confiable." } ], "id": "CVE-2023-5594", "lastModified": "2024-11-21T08:42:05.600", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.7, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-21T12:15:08.293", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-15 08:15
Modified
2025-01-23 17:18
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
References
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | file_security | * | |
eset | internet_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | nod32_antivirus | * | |
eset | security | * | |
eset | security | * | |
eset | security | * | |
eset | security | * | |
eset | security | * | |
eset | server_security | * | |
eset | server_security | * | |
eset | server_security | * | |
eset | server_security | * | |
eset | smart_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "FD0A2DF6-7A58-491C-AEB8-A2E680AC98F1", "versionEndExcluding": "8.1.2062.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "05E9177E-5D0F-41ED-8294-DFB89E3876E4", "versionEndExcluding": "9.1.2071.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0B60BF84-00BE-4DB0-8997-743F57416BE4", "versionEndExcluding": "10.0.2052.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0164AE41-F12C-4B0D-8974-D7437BFB06B4", "versionEndExcluding": "10.1.2063.0", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "4E612901-DB52-4059-9817-92C60A84BB2C", "versionEndExcluding": "11.0.2032.0", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "74C3F07A-2298-4521-BBC0-F2E48BA982F9", "versionEndExcluding": "8.1.2062.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B3D79959-D8FE-4F95-A8E8-03308948FC5D", "versionEndExcluding": "9.1.2071.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "346C043C-2DE2-490B-A36B-8D0970DFD4B6", "versionEndExcluding": "10.0.2052.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "71A365AB-99CA-4FA9-A451-5C96B0A5A7F5", "versionEndExcluding": "10.1.2063.0", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "395C3173-EDC0-41D7-85B2-612C4DBD98F0", "versionEndExcluding": "11.0.2032.0", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:*", "matchCriteriaId": "1AB25077-C346-4D68-8089-6042BFDA655C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA4D106F-E8B7-43E9-A568-D779AE96128B", "versionEndExcluding": "17.0.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "130C22A6-09A5-4271-9777-E0104049B549", "versionEndExcluding": "7.3.10018.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "3907201A-AB03-472D-888E-C2F4263FF142", "versionEndExcluding": "7.3.14006.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "222094AC-A5B4-4951-8A66-DE4230E2480F", "versionEndExcluding": "8.0.10024.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "050BA9DE-6985-4833-90C6-60018F521995", "versionEndExcluding": "8.0.14014.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "FE6862D1-1DC9-492E-B1A7-21DC8F5102C4", "versionEndExcluding": "9.0.10012.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "EDB3A57E-7B60-4FAC-BE08-DF10CE47C8E2", "versionEndExcluding": "9.0.14008.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "33552BAC-3DD8-4367-AFD3-ACF6A4B0EC15", "versionEndExcluding": "10.0.10018.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "45C8E944-C3B4-4AB7-8332-F51821F7C253", "versionEndExcluding": "10.0.14007.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "AE42F470-97D5-405F-8DDB-58030A8A7339", "versionEndExcluding": "10.1.10014.0", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B0F994D-291F-4037-9F38-2ADD30917A1B", "versionEndExcluding": "17.0.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "B1008F99-C3F2-4D79-A37D-2239E7C5535F", "versionEndExcluding": "7.3.15006.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*", "matchCriteriaId": "F78781C7-AD74-4D14-A955-A0380CE7B73F", "versionEndExcluding": "17.0.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "732DD0AC-2D36-41E5-9005-3BA04D2BC920", "versionEndExcluding": "8.0.15012.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "61D23E98-F343-41C8-A9CB-14937455AF7E", "versionEndExcluding": "9.0.15006.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "EDEE8E3A-1A7B-4DBC-9C2A-6A7E4BB1B9B3", "versionEndExcluding": "10.0.15005.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "91DE9E8D-6155-42BB-A303-4A31B3A65C49", "versionEndExcluding": "7.3.12013.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "C2722856-080B-4025-AD29-7B758303F442", "versionEndExcluding": "8.0.12016.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "BA373E8F-2D94-4EF4-96C4-0306D969EB37", "versionEndExcluding": "9.0.12019.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "B3A3E72B-98E3-4754-815F-3B3CE57AC8EA", "versionEndExcluding": "10.0.12015.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*", "matchCriteriaId": "1B58F4A8-5BF7-4F3E-8267-E5D43D7AA538", "versionEndExcluding": "17.0.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET\u2019s file operations to delete files without having proper permission." }, { "lang": "es", "value": "La vulnerabilidad de escalada de privilegios local potencialmente permiti\u00f3 a un atacante hacer un mal uso de las operaciones de archivos de ESET para eliminar archivos sin tener el permiso adecuado." } ], "id": "CVE-2024-0353", "lastModified": "2025-01-23T17:18:06.060", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-15T08:15:46.023", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-07 14:29
Modified
2024-11-21 03:38
Severity ?
Summary
Untrusted search path vulnerability in the installers of multiple Canon IT Solutions Inc. software programs (ESET Smart Security Premium, ESET Internet Security, ESET Smart Security, ESET NOD32 Antivirus, DESlock+ Pro, and CompuSec (all programs except packaged ones)) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN41452671/index.html | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://eset-support.canon-its.jp/faq/show/10720?site_domain=default | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN41452671/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://eset-support.canon-its.jp/faq/show/10720?site_domain=default | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | compusec | - | |
eset | deslock\+_pro | - | |
eset | internet_security | - | |
eset | nod32_antivirus | - | |
eset | smart_security | - | |
eset | smart_security_premium | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:compusec:-:*:*:*:*:*:*:*", "matchCriteriaId": "63B943DB-777D-4FC3-9E52-6798C1D9D449", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:deslock\\+_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5E9CA87-AC2E-442D-A1ED-16EE7F843DDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CAD248-1F32-4459-A530-8706E334C67F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6253FAFB-0AE6-494A-950D-EB0EB15E982C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "3145062C-7BBA-41FE-9C2C-3B4B5464C4C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security_premium:-:*:*:*:*:*:*:*", "matchCriteriaId": "66086537-418D-4295-8AC9-E33CF947F598", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in the installers of multiple Canon IT Solutions Inc. software programs (ESET Smart Security Premium, ESET Internet Security, ESET Smart Security, ESET NOD32 Antivirus, DESlock+ Pro, and CompuSec (all programs except packaged ones)) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory." }, { "lang": "es", "value": "Vulnerabilidad de ruta de b\u00fasqueda no fiable en los instaladores de m\u00faltiples programas de software de Canon IT Solutions Inc. (ESET Smart Security Premium, ESET Internet Security, ESET Smart Security, ESET NOD32 Antivirus, DESlock+ Pro y CompuSec; todos los programas menos los empaquetados) permite que un atacante obtenga privilegios mediante un archivo DLL troyano en un directorio sin especificar." } ], "id": "CVE-2018-0649", "lastModified": "2024-11-21T03:38:39.803", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-07T14:29:01.617", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN41452671/index.html" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://eset-support.canon-its.jp/faq/show/10720?site_domain=default" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvn.jp/en/jp/JVN41452671/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://eset-support.canon-its.jp/faq/show/10720?site_domain=default" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:20
Severity ?
Summary
A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.eset.com/en/ca7794-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca7794-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | * | |
eset | endpoint_security | * | |
eset | file_security | * | |
eset | internet_security | * | |
eset | internet_security | 1294 | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | nod32_antivirus | * | |
eset | nod32_antivirus | * | |
eset | security | * | |
eset | security | * | |
eset | smart_security | * | |
eset | smart_security | * | |
eset | smart_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:-:*:*", "matchCriteriaId": "8AB7C2EB-F12D-4F5A-86A0-D1C71B10D301", "versionEndIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "52BCDA83-E591-4BBB-B173-3802182B8728", "versionEndIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "B726EEB4-03A5-4025-8C8E-66625338A0FD", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2B75F9E-CCBE-49E3-A49F-054EE92E1D0C", "versionEndIncluding": "13.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:1294:*:*:*:*:*:*:*", "matchCriteriaId": "B429D321-4E00-451F-BFDF-A61BF20CCC77", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "30D87B08-6868-41A2-93F5-1B732A07F652", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "52072A74-AA1E-48B9-ACBC-B97BA215F9DC", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:business:*:*:*", "matchCriteriaId": "795CFE63-4F55-4B8E-9E4E-A6510895B637", "versionEndIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:-:*:*", "matchCriteriaId": "E95834A0-B683-4CCE-B3FB-1387071FB778", "versionEndIncluding": "13.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:kerio:*:*", "matchCriteriaId": "464764FF-8739-407A-B9D3-9F871E2933B2", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "A171F5E4-F90A-41CE-829B-5A2F0DC0BC86", "versionEndIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:business:*:*:*", "matchCriteriaId": "4F7FAB9F-5A35-4D61-B325-8286EB9A7577", "versionEndIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:-:*:*:*", "matchCriteriaId": "E4194A89-6382-4174-B592-15219A0EFFEE", "versionEndIncluding": "13.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*", "matchCriteriaId": "DCD75955-648A-4644-ADB4-002673AA9E3D", "versionEndIncluding": "13.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower." }, { "lang": "es", "value": "Un usuario local (autenticado) con pocos privilegios puede explotar un comportamiento en un instalador de ESET para lograr la sobrescritura (eliminaci\u00f3n) arbitraria de cualquier archivo por medio de un enlace simb\u00f3lico, debido a permisos no seguros.\u0026#xa0;La posibilidad de aprovechar esta vulnerabilidad es limitada y solo puede tener lugar durante la fase de instalaci\u00f3n de los productos ESET.\u0026#xa0;Adem\u00e1s, la explotaci\u00f3n solo puede tener \u00e9xito cuando Self-Defense est\u00e1 desactivada.\u0026#xa0;Los productos afectados son: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versiones 13.2 y anteriores;\u0026#xa0;ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versiones 7.3 y anteriores;\u0026#xa0;ESET File Security para Microsoft Windows Server, ESET Mail Security para Microsoft Exchange Server, ESET Mail Security para IBM Domino, ESET Security para Kerio" } ], "id": "CVE-2020-26941", "lastModified": "2024-11-21T05:20:32.763", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-26T18:15:45.613", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca7794-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca7794-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-29 14:15
Modified
2024-11-21 04:57
Severity ?
Summary
ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.eset.com/en/ca7489-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca7489-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | antivirus_and_antispyware | * | |
eset | endpoint_antivirus | - | |
eset | endpoint_security | - | |
eset | file_security | - | |
eset | internet_security | - | |
eset | mail_security | - | |
eset | mail_security | - | |
eset | mail_security | - | |
eset | mail_security | - | |
eset | nod32_antivirus | - | |
eset | nod32_antivirus | - | |
eset | smart_security | - | |
eset | smart_security | - | |
eset | smart_security | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:antivirus_and_antispyware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBC3B9B3-1446-4630-88FE-65D41B1D077D", "versionEndIncluding": "1560", "versionStartIncluding": "1553", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:-:*:*", "matchCriteriaId": "2B76C798-A8F7-4705-B85A-98CE4C44AC53", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "81593DEE-54D7-49D5-9AE6-20B7E2B0AF8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:file_security:-:*:*:*:*:windows_server:*:*", "matchCriteriaId": "EDA61743-424D-40C9-ADD5-25AF8786BB0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2CAD248-1F32-4459-A530-8706E334C67F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*", "matchCriteriaId": "5043B5B1-38B2-4621-B738-A79E5DF8D98E", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "DE40A56E-EBC0-43C8-85FB-868802B4817F", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:kerio:*:*", "matchCriteriaId": "B322B8F3-DD12-4177-9DDF-BCFCD39DB12A", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "EB4668BB-DE5D-443B-9A76-353688EE919B", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6253FAFB-0AE6-494A-950D-EB0EB15E982C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:-:*:*:*:business:*:*:*", "matchCriteriaId": "12E15271-D518-48E1-AE47-3080A748E131", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:-:*:*:*:-:*:*:*", "matchCriteriaId": "CE29DD0C-648B-4B6F-B080-B350E8210B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:-:*:*:*:business:*:*:*", "matchCriteriaId": "38FD5027-F4B6-4398-B93A-DDF0FFC74386", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:-:*:*:*:premium:*:*:*", "matchCriteriaId": "375F46B4-9FDF-48FB-935A-8BB6FEF5221A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation." }, { "lang": "es", "value": "Los m\u00f3dulos 1553 hasta 1560 de ESET Antivirus y Antispyware Module, permite a un usuario con derechos de acceso limitados crear enlaces f\u00edsicos en algunos directorios de ESET y luego forzar al producto a escribir por medio de estos enlaces en archivos que normalmente no podr\u00edan ser escritos por el usuario, logrando as\u00ed una escalada de privilegios." } ], "id": "CVE-2020-11446", "lastModified": "2024-11-21T04:57:56.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-29T14:15:17.607", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca7489-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca7489-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-06 20:15
Modified
2024-11-21 04:54
Severity ?
Summary
ESET Archive Support Module before 1294 allows virus-detection bypass via crafted RAR Compression Information in an archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | cyber_security | * | |
eset | internet_security | * | |
eset | mobile_security | * | |
eset | mobile_security | 1294 | |
eset | nod32_antivirus | * | |
eset | nod32_antivirus | * | |
eset | smart_security | * | |
eset | smart_tv_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:cyber_security:*:*:*:*:*:macos:*:*", "matchCriteriaId": "873A6C9F-D339-492F-9234-727BD59D49AE", "versionEndExcluding": "1294", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "9001E431-4FF0-4C27-919F-FE8D0BD9E5DC", "versionEndExcluding": "1294", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mobile_security:*:*:*:*:*:android:*:*", "matchCriteriaId": "46BEDBE3-DB0E-4BFE-984F-DA9C1E7ECCB7", "versionEndExcluding": "1294", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mobile_security:1294:*:*:*:*:*:*:*", "matchCriteriaId": "CB6657C0-35FB-4FF4-9FD6-2BF830F7525C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:linux:*:*", "matchCriteriaId": "B0A0FE2F-0948-44AC-AA2E-D7861FA14B50", "versionEndExcluding": "4", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEBB2951-7954-4F12-954F-835FF21487B3", "versionEndExcluding": "1294", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*", "matchCriteriaId": "C5D4AC1D-31F1-40A5-82AB-2250F7667553", "versionEndExcluding": "1294", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_tv_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "14871E5E-3939-421B-837F-BE9CF1416687", "versionEndExcluding": "1294", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ESET Archive Support Module before 1294 allows virus-detection bypass via crafted RAR Compression Information in an archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop." }, { "lang": "es", "value": "ESET Archive Support Module versiones anteriores a 1294, permite una omisi\u00f3n de detecci\u00f3n de virus por medio de una Informaci\u00f3n de Compresi\u00f3n RAR en un archivo. Esto afecta a las versiones anteriores a 1294 de Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security para Android, Smart TV Security, y NOD32 Antivirus 4 para Linux Desktop." } ], "id": "CVE-2020-10193", "lastModified": "2024-11-21T04:54:56.763", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-06T20:15:12.597", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.zoller.lu/p/from-low-hanging-fruit-department_13.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-436" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-31 13:15
Modified
2024-11-21 08:45
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
Unquoted service path in ESET products allows to
drop a prepared program to a specific location and run on boot with the
NT AUTHORITY\NetworkService permissions.
References
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8602 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8602 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | * | |
eset | endpoint_security | * | |
eset | internet_security | * | |
eset | mail_security | 10.1.10012.0 | |
eset | nod32_antivirus | * | |
eset | smart_security_premium | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "50677A92-50F3-4020-BC55-B3C6FDB4511D", "versionEndExcluding": "11.0.2032.0", "versionStartIncluding": "10.1.2046.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "74708E09-04BF-47C1-88A9-B2A0C0FCF3B7", "versionEndExcluding": "11.0.2032.0", "versionStartIncluding": "10.1.2046.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "84EF91DD-15F6-4EF8-8B5F-C4CF4DBCBDF9", "versionEndExcluding": "17.0.15.0", "versionStartIncluding": "16.1.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:10.1.10012.0:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "18A15279-74DB-487D-A585-BB07482505E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "D18A8A98-430B-495B-AAD9-8198E995F77E", "versionEndExcluding": "17.0.15.0", "versionStartIncluding": "16.1.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security_premium:*:*:*:*:*:*:*:*", "matchCriteriaId": "555830F1-6B12-44F7-B912-9061E0EB6E46", "versionEndExcluding": "17.0.15.0", "versionStartIncluding": "16.1.14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unquoted service path in ESET products allows to \n\ndrop a prepared program to a specific location\u00a0and\u00a0run on boot with the \n\nNT AUTHORITY\\NetworkService\u00a0permissions." }, { "lang": "es", "value": "La ruta de servicio sin comillas en los productos ESET permite colocar un programa preparado en una ubicaci\u00f3n espec\u00edfica y ejecutarlo al arrancar con los permisos NT AUTHORITY\\NetworkService." } ], "id": "CVE-2023-7043", "lastModified": "2024-11-21T08:45:06.820", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-31T13:15:10.147", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8602" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-09 06:15
Modified
2024-11-21 06:15
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
References
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | Vendor Advisory | |
security@eset.com | https://www.zerodayinitiative.com/advisories/ZDI-22-148/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-148/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | file_security | * | |
eset | internet_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | nod32_antivirus | * | |
eset | security | * | |
eset | server_security | * | |
eset | server_security | 8.0.12003.0 | |
eset | server_security | 8.0.12003.1 | |
eset | smart_security | * | |
eset | smart_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0D494F17-5B37-44D5-B479-BCEC4F9D9921", "versionEndExcluding": "7.3.2055.0", "versionStartIncluding": "6.6.2046.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "638E5789-809F-475C-8B3D-E33C5EA92B1F", "versionEndExcluding": "8.0.2028.3", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "74F5AF0F-9CE2-4CAD-A313-DCEA350CF8AB", "versionEndExcluding": "8.1.2031.4", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "4DE8CF7C-1C9C-448A-83AD-6659CA610C3E", "versionEndExcluding": "9.0.2032.6", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "33CA36F6-CE4D-4E1B-B5EC-D21DF39DFFE5", "versionEndExcluding": "7.3.2055.0", "versionStartIncluding": "6.6.2046.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0C2C253F-7980-43CE-8E5F-40779DBD8D88", "versionEndExcluding": "8.0.2028.3", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "AF09B28D-D422-4028-8A31-2F55F131A69F", "versionEndExcluding": "8.1.2031.4", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3AAD4B6F-6B42-498E-A076-732874709B7F", "versionEndExcluding": "9.0.2032.6", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "E210C3F1-0F2E-459D-879E-E6B086498064", "versionEndIncluding": "7.3.12006.0", "versionStartIncluding": "7.0.12014.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7F7996D3-D9B9-42F2-B72E-76A469982678", "versionEndExcluding": "15.0.18.0", "versionStartIncluding": "10.0.337.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "5C50B379-3966-4EAD-B7B9-D947F579C16E", "versionEndExcluding": "7.3.10014.0", "versionStartIncluding": "7.0.10019", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "64635AFE-0951-45D7-80B9-3D9CD184B14C", "versionEndExcluding": "7.3.14003.0", "versionStartIncluding": "7.0.14008.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "5D129FDA-4840-4BE6-89CA-CB36A21A9BE9", "versionEndExcluding": "8.0.14006.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "63812015-CAD8-433A-B3CC-58D397793646", "versionEndExcluding": "8.0.10018.0", "versionStartIncluding": "8.0.10012.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "D8E297F9-0DAB-4EE5-A8E6-DFE7B2234AC2", "versionEndIncluding": "15.0.18.0", "versionStartIncluding": "10.0.337.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint:*:*", "matchCriteriaId": "4894CF51-27CF-4EB1-B898-04BBBCD45CCA", "versionEndIncluding": "8.0.15004.0", "versionStartIncluding": "7.0.15008.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:azure:*:*:*", "matchCriteriaId": "309C9C05-EC2A-4B45-A912-07DA47A6C65C", "versionEndIncluding": "7.2.12004.1000", "versionStartIncluding": "7.0.12016.1002", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:8.0.12003.0:*:*:*:*:windows_server:*:*", "matchCriteriaId": "2A6490D2-AA1D-4063-93FA-54A7C3701904", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:8.0.12003.1:*:*:*:*:windows_server:*:*", "matchCriteriaId": "242158EE-6A39-4A03-B618-B025645E30EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:-:windows:*:*", "matchCriteriaId": "8FA2888F-C7F3-4F98-B961-9887F821B780", "versionEndIncluding": "15.0.18.0", "versionStartIncluding": "10.0.337.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*", "matchCriteriaId": "18E4245E-D7AB-4496-931E-9A96A946241B", "versionEndIncluding": "15.0.18.0", "versionStartIncluding": "10.0.337.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM." }, { "lang": "es", "value": "Los productos de ESET para Windows permiten a un proceso no confiable hacerse pasar por el cliente de una tuber\u00eda, lo que puede ser aprovechado por un atacante para escalar privilegios en el contexto de NT AUTHORITY\\SYSTEM" } ], "id": "CVE-2021-37852", "lastModified": "2024-11-21T06:15:58.793", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-09T06:15:06.990", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" }, { "source": "security@eset.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-16 09:15
Modified
2024-11-21 09:30
Severity ?
6.1 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met.
References
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8688 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8688 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | internet_security | * | |
eset | nod32 | * | |
eset | security | * | |
eset | smart_security | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_security | * | |
eset | server_security | * | |
eset | mail_security | * | |
eset | mail_security | - | |
eset | security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "B883CA27-1FC9-4AF6-9BBD-6FC41DE3A667", "versionEndExcluding": "17.2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32:*:*:*:*:*:*:*:*", "matchCriteriaId": "620325BE-DDE6-4ADE-BB6A-36CA8E48A30A", "versionEndExcluding": "17.2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*", "matchCriteriaId": "0EB1BEC6-15AD-4B95-A954-814594AE8FCB", "versionEndExcluding": "17.2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*", "matchCriteriaId": "B5D76653-60CC-4107-A027-02E2A1B255DE", "versionEndExcluding": "17.2.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "102DE882-64EA-4752-9722-2EAE0074BF91", "versionEndExcluding": "11.1.2039.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "56305C95-A7D6-49BC-8CEE-5EA343190842", "versionEndExcluding": "11.1.2039.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "9F9E6C2C-AA89-4377-B0A0-6B3B36209B90", "versionEndExcluding": "11.0.12012.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "A8906CBA-D3F0-4BC1-B32A-11D4425EE784", "versionEndIncluding": "11.0.10008.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*", "matchCriteriaId": "5043B5B1-38B2-4621-B738-A79E5DF8D98E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "61BC0A21-A589-48B5-9D35-E0E8749EDFDB", "versionEndExcluding": "11.0.15004.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met." }, { "lang": "es", "value": "La vulnerabilidad de denegaci\u00f3n de servicio presente poco despu\u00e9s de la instalaci\u00f3n o actualizaci\u00f3n del producto, potencialmente permiti\u00f3 que un atacante dejara inoperable el producto de seguridad de ESET, siempre que se cumplieran condiciones previas no predeterminadas." } ], "id": "CVE-2024-3779", "lastModified": "2024-11-21T09:30:22.927", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-16T09:15:02.877", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8688" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-10 20:15
Modified
2024-11-21 06:55
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Summary
Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
References
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8268 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8268 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | file_security | * | |
eset | internet_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | nod32_antivirus | * | |
eset | security | * | |
eset | server_security | * | |
eset | server_security | * | |
eset | smart_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B3B4B09F-0A8D-433D-BEB0-95B1F71C4243", "versionEndExcluding": "8.0.2053.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "C1B57A00-9B42-46B7-AFE1-2DF41E3AD7C8", "versionEndExcluding": "8.1.2050.0", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9126E224-6F5B-4312-A268-25785D33D332", "versionEndExcluding": "9.0.2046.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "64320D36-E321-4AC5-B769-03B41FAF37DE", "versionEndExcluding": "8.0.2053.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0839107D-7843-4C27-B91F-33733CD3658D", "versionEndExcluding": "8.1.2050.0", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F47550A5-8416-44F4-8104-58FFB9F94EF5", "versionEndExcluding": "9.0.2046.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "0C0E8002-5140-494C-A890-E1D40E398F2C", "versionEndExcluding": "8.0.12013.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "90FE16A7-F332-48C0-B42B-612B481CCA50", "versionEndExcluding": "15.1.12.0", "versionStartIncluding": "11.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "33D85DF1-A33C-4445-AA40-E6DC181C455B", "versionEndExcluding": "8.0.10020.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "19005039-6B1F-4622-AA24-4428A8B69360", "versionEndExcluding": "8.0.14011.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "C39C1B8A-80FC-450B-BE04-2908389FC61C", "versionEndExcluding": "15.1.12.0", "versionStartIncluding": "11.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "9292F9CA-FD25-4BE1-AAB6-E1DC060EA66A", "versionEndExcluding": "8.0.15009.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:azure:*:*", "matchCriteriaId": "C34234B3-5AC3-4896-9F5F-57DABC8527F1", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "C98987B5-8F3F-4EE1-82EB-80F2620BD3A0", "versionEndExcluding": "9.0.12012.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*", "matchCriteriaId": "6E82A43A-0260-4038-8BF6-F39F8E9438B8", "versionEndExcluding": "15.1.12.0", "versionStartIncluding": "11.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit \"Repair\" and \"Uninstall\" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0." }, { "lang": "es", "value": "Una vulnerabilidad de escalada de privilegios en los productos Windows de ESET, spol. s r.o. permite a un atacante explotar las funciones \"Repair\" y \"Uninstall\", lo que puede conllevar a una eliminaci\u00f3n arbitraria de archivos. Este problema afecta a: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versiones anteriores a 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versiones anteriores a 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versiones anteriores a 9.0.12012.0. ESET, spol. s r.o. ESET File Security para Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security para Microsoft Exchange Server 6.0 versiones anteriores a 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security para IBM Domino 6.0 versiones anteriores a 8.0.14011.0. ESET, spol. s r.o. ESET Security para Microsoft SharePoint Server 6.0 versiones anteriores a 8.0.15009.0" } ], "id": "CVE-2022-27167", "lastModified": "2024-11-21T06:55:19.893", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-10T20:15:09.407", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8268" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-280" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }