fkie_cve-2024-0353
Vulnerability from fkie_nvd
Published
2024-02-15 08:15
Modified
2025-01-23 17:18
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_antivirus | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | endpoint_security | * | |
eset | file_security | * | |
eset | internet_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | mail_security | * | |
eset | nod32_antivirus | * | |
eset | security | * | |
eset | security | * | |
eset | security | * | |
eset | security | * | |
eset | security | * | |
eset | server_security | * | |
eset | server_security | * | |
eset | server_security | * | |
eset | server_security | * | |
eset | smart_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "FD0A2DF6-7A58-491C-AEB8-A2E680AC98F1", "versionEndExcluding": "8.1.2062.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "05E9177E-5D0F-41ED-8294-DFB89E3876E4", "versionEndExcluding": "9.1.2071.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0B60BF84-00BE-4DB0-8997-743F57416BE4", "versionEndExcluding": "10.0.2052.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0164AE41-F12C-4B0D-8974-D7437BFB06B4", "versionEndExcluding": "10.1.2063.0", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*", "matchCriteriaId": "4E612901-DB52-4059-9817-92C60A84BB2C", "versionEndExcluding": "11.0.2032.0", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "74C3F07A-2298-4521-BBC0-F2E48BA982F9", "versionEndExcluding": "8.1.2062.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "B3D79959-D8FE-4F95-A8E8-03308948FC5D", "versionEndExcluding": "9.1.2071.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "346C043C-2DE2-490B-A36B-8D0970DFD4B6", "versionEndExcluding": "10.0.2052.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "71A365AB-99CA-4FA9-A451-5C96B0A5A7F5", "versionEndExcluding": "10.1.2063.0", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*", "matchCriteriaId": "395C3173-EDC0-41D7-85B2-612C4DBD98F0", "versionEndExcluding": "11.0.2032.0", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:*", "matchCriteriaId": "1AB25077-C346-4D68-8089-6042BFDA655C", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA4D106F-E8B7-43E9-A568-D779AE96128B", "versionEndExcluding": "17.0.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "130C22A6-09A5-4271-9777-E0104049B549", "versionEndExcluding": "7.3.10018.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "3907201A-AB03-472D-888E-C2F4263FF142", "versionEndExcluding": "7.3.14006.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "222094AC-A5B4-4951-8A66-DE4230E2480F", "versionEndExcluding": "8.0.10024.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "050BA9DE-6985-4833-90C6-60018F521995", "versionEndExcluding": "8.0.14014.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "FE6862D1-1DC9-492E-B1A7-21DC8F5102C4", "versionEndExcluding": "9.0.10012.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "EDB3A57E-7B60-4FAC-BE08-DF10CE47C8E2", "versionEndExcluding": "9.0.14008.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "33552BAC-3DD8-4367-AFD3-ACF6A4B0EC15", "versionEndExcluding": "10.0.10018.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "45C8E944-C3B4-4AB7-8332-F51821F7C253", "versionEndExcluding": "10.0.14007.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*", "matchCriteriaId": "AE42F470-97D5-405F-8DDB-58030A8A7339", "versionEndExcluding": "10.1.10014.0", "versionStartIncluding": "10.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B0F994D-291F-4037-9F38-2ADD30917A1B", "versionEndExcluding": "17.0.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "B1008F99-C3F2-4D79-A37D-2239E7C5535F", "versionEndExcluding": "7.3.15006.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*", "matchCriteriaId": "F78781C7-AD74-4D14-A955-A0380CE7B73F", "versionEndExcluding": "17.0.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "732DD0AC-2D36-41E5-9005-3BA04D2BC920", "versionEndExcluding": "8.0.15012.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "61D23E98-F343-41C8-A9CB-14937455AF7E", "versionEndExcluding": "9.0.15006.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*", "matchCriteriaId": "EDEE8E3A-1A7B-4DBC-9C2A-6A7E4BB1B9B3", "versionEndExcluding": "10.0.15005.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "91DE9E8D-6155-42BB-A303-4A31B3A65C49", "versionEndExcluding": "7.3.12013.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "C2722856-080B-4025-AD29-7B758303F442", "versionEndExcluding": "8.0.12016.0", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "BA373E8F-2D94-4EF4-96C4-0306D969EB37", "versionEndExcluding": "9.0.12019.0", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*", "matchCriteriaId": "B3A3E72B-98E3-4754-815F-3B3CE57AC8EA", "versionEndExcluding": "10.0.12015.0", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*", "matchCriteriaId": "1B58F4A8-5BF7-4F3E-8267-E5D43D7AA538", "versionEndExcluding": "17.0.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET\u2019s file operations to delete files without having proper permission." }, { "lang": "es", "value": "La vulnerabilidad de escalada de privilegios local potencialmente permiti\u00f3 a un atacante hacer un mal uso de las operaciones de archivos de ESET para eliminar archivos sin tener el permiso adecuado." } ], "id": "CVE-2024-0353", "lastModified": "2025-01-23T17:18:06.060", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security@eset.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-15T08:15:46.023", "references": [ { "source": "security@eset.com", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed" } ], "sourceIdentifier": "security@eset.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "security@eset.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…