CVE-2023-2847 (GCVE-0-2023-2847)
Vulnerability from cvelistv5
Published
2023-06-15 07:46
Modified
2024-12-12 16:38
CWE
  • CWE-269 - Improper Privilege Management
Summary
During internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges. ESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:33:05.820Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8447"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-2847",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-12T16:38:10.347865Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-12T16:38:25.361Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "Server Security for Linux",
          "vendor": "ESET",
          "versions": [
            {
              "status": "unaffected",
              "version": "9.1.98.0"
            },
            {
              "status": "unaffected",
              "version": "9.0.466.0"
            },
            {
              "status": "unaffected",
              "version": "8.1.823.0"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Endpoint Antivirus for Linux",
          "vendor": "ESET",
          "versions": [
            {
              "status": "unaffected",
              "version": "9.1.11.0"
            },
            {
              "status": "unaffected",
              "version": "9.0.10.0"
            },
            {
              "status": "unaffected",
              "version": "8.1.12.0"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Cyber Security",
          "vendor": "ESET ",
          "versions": [
            {
              "status": "unaffected",
              "version": "7.3.3700.0"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Endpoint Antivirus for macOS",
          "vendor": "ESET ",
          "versions": [
            {
              "status": "unaffected",
              "version": "7.3.3600.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\u003c/p\u003e\u003cp\u003eESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\u003c/p\u003e\n\n"
            }
          ],
          "value": "\nDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\n\nESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\n\n\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-15T07:46:47.134Z",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.eset.com/en/ca8447"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Local privilege escalation in ESET products for Linux and MacOS",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2023-2847",
    "datePublished": "2023-06-15T07:46:47.134Z",
    "dateReserved": "2023-05-23T07:26:04.714Z",
    "dateUpdated": "2024-12-12T16:38:25.361Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-2847\",\"sourceIdentifier\":\"security@eset.com\",\"published\":\"2023-06-15T08:15:09.150\",\"lastModified\":\"2024-11-21T07:59:24.787\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\\n\\nESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\\n\\n\\n\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@eset.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.1,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@eset.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:cyber_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.3.0\",\"versionEndExcluding\":\"7.3.3700.0\",\"matchCriteriaId\":\"98364EAC-A092-43AD-9E40-07461C2C88CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:linux_kernel:*:*\",\"versionEndExcluding\":\"8.1.12.0\",\"matchCriteriaId\":\"3790FBC6-9B62-4793-B247-8A5EC1E3A44C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:macos:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.3.3600.0\",\"matchCriteriaId\":\"0F0477F7-831B-43E7-BC10-F4271394A1AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:linux_kernel:*:*\",\"versionStartIncluding\":\"9.0.5.0\",\"versionEndExcluding\":\"9.0.10.0\",\"matchCriteriaId\":\"654CCEB1-6BAC-41E3-85AD-A1FA17BD194D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:linux_kernel:*:*\",\"versionStartIncluding\":\"9.1.4.0\",\"versionEndExcluding\":\"9.1.11.0\",\"matchCriteriaId\":\"4223FD72-EA39-4656-B268-FF23319F55E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:server_security:*:*:*:*:*:linux_kernel:*:*\",\"versionEndExcluding\":\"8.1.823.0\",\"matchCriteriaId\":\"BF425CAB-6E2E-4D3F-B4BC-951D58D16A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:server_security:*:*:*:*:*:linux_kernel:*:*\",\"versionStartIncluding\":\"9.0.464.0\",\"versionEndExcluding\":\"9.0.466.0\",\"matchCriteriaId\":\"E3BC0EF1-1CA5-4071-8D8E-259D49868EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:server_security:*:*:*:*:*:linux_kernel:*:*\",\"versionStartIncluding\":\"9.1.96.0\",\"versionEndExcluding\":\"9.1.98.0\",\"matchCriteriaId\":\"6A51D2FC-FD35-45B9-B293-2663EE84380F\"}]}]}],\"references\":[{\"url\":\"https://support.eset.com/en/ca8447\",\"source\":\"security@eset.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.eset.com/en/ca8447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.eset.com/en/ca8447\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T06:33:05.820Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-2847\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-12T16:38:10.347865Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-12T16:38:21.308Z\"}}], \"cna\": {\"title\": \"Local privilege escalation in ESET products for Linux and MacOS\", \"source\": {\"discovery\": \"INTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-233\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-233 Privilege Escalation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"ESET\", \"product\": \"Server Security for Linux\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"9.1.98.0\"}, {\"status\": \"unaffected\", \"version\": \"9.0.466.0\"}, {\"status\": \"unaffected\", \"version\": \"8.1.823.0\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"ESET\", \"product\": \"Endpoint Antivirus for Linux\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"9.1.11.0\"}, {\"status\": \"unaffected\", \"version\": \"9.0.10.0\"}, {\"status\": \"unaffected\", \"version\": \"8.1.12.0\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"ESET \", \"product\": \"Cyber Security\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"7.3.3700.0\"}], \"defaultStatus\": \"affected\"}, {\"vendor\": \"ESET \", \"product\": \"Endpoint Antivirus for macOS\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"7.3.3600.0\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://support.eset.com/en/ca8447\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\nDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\\n\\nESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\u003cp\u003eDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\u003c/p\u003e\u003cp\u003eESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\u003c/p\u003e\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269 Improper Privilege Management\"}]}], \"providerMetadata\": {\"orgId\": \"4a9b9929-2450-4021-b7b9-469a0255b215\", \"shortName\": \"ESET\", \"dateUpdated\": \"2023-06-15T07:46:47.134Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-2847\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-12T16:38:25.361Z\", \"dateReserved\": \"2023-05-23T07:26:04.714Z\", \"assignerOrgId\": \"4a9b9929-2450-4021-b7b9-469a0255b215\", \"datePublished\": \"2023-06-15T07:46:47.134Z\", \"assignerShortName\": \"ESET\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…