fkie_cve-2022-27167
Vulnerability from fkie_nvd
Published
2022-05-10 20:15
Modified
2024-11-21 06:55
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Summary
Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
References
▼ | URL | Tags | |
---|---|---|---|
security@eset.com | https://support.eset.com/en/ca8268 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.eset.com/en/ca8268 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | file_security | * | |
eset | internet_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | nod32_antivirus | * | |
eset | security | * | |
eset | server_security | * | |
eset | server_security | * | |
eset | smart_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B3B4B09F-0A8D-433D-BEB0-95B1F71C4243", "versionEndExcluding": "8.0.2053.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "C1B57A00-9B42-46B7-AFE1-2DF41E3AD7C8", "versionEndExcluding": "8.1.2050.0", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "9126E224-6F5B-4312-A268-25785D33D332", "versionEndExcluding": "9.0.2046.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "64320D36-E321-4AC5-B769-03B41FAF37DE", "versionEndExcluding": "8.0.2053.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0839107D-7843-4C27-B91F-33733CD3658D", "versionEndExcluding": "8.1.2050.0", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F47550A5-8416-44F4-8104-58FFB9F94EF5", "versionEndExcluding": "9.0.2046.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "0C0E8002-5140-494C-A890-E1D40E398F2C", "versionEndExcluding": "8.0.12013.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "90FE16A7-F332-48C0-B42B-612B481CCA50", "versionEndExcluding": "15.1.12.0", "versionStartIncluding": "11.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "33D85DF1-A33C-4445-AA40-E6DC181C455B", "versionEndExcluding": "8.0.10020.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "19005039-6B1F-4622-AA24-4428A8B69360", "versionEndExcluding": "8.0.14011.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "C39C1B8A-80FC-450B-BE04-2908389FC61C", "versionEndExcluding": "15.1.12.0", "versionStartIncluding": "11.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "9292F9CA-FD25-4BE1-AAB6-E1DC060EA66A", "versionEndExcluding": "8.0.15009.0", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:azure:*:*", "matchCriteriaId": "C34234B3-5AC3-4896-9F5F-57DABC8527F1", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "C98987B5-8F3F-4EE1-82EB-80F2620BD3A0", "versionEndExcluding": "9.0.12012.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*", "matchCriteriaId": "6E82A43A-0260-4038-8BF6-F39F8E9438B8", "versionEndExcluding": "15.1.12.0", "versionStartIncluding": "11.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit \"Repair\" and \"Uninstall\" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0." }, { "lang": "es", "value": "Una vulnerabilidad de escalada de privilegios en los productos Windows de ESET, spol. s r.o. permite a un atacante explotar las funciones \"Repair\" y \"Uninstall\", lo que puede conllevar a una eliminaci\u00f3n arbitraria de archivos. Este problema afecta a: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versiones anteriores a 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versiones anteriores a 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versiones anteriores a 9.0.12012.0. ESET, spol. s r.o. ESET File Security para Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security para Microsoft Exchange Server 6.0 versiones anteriores a 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security para IBM Domino 6.0 versiones anteriores a 8.0.14011.0. ESET, spol. s r.o. ESET Security para Microsoft SharePoint Server 6.0 versiones anteriores a 8.0.15009.0" } ], "id": "CVE-2022-27167", "lastModified": "2024-11-21T06:55:19.893", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-10T20:15:09.407", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8268" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-280" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.