Search criteria

82 vulnerabilities found for Security by ESET

CERTFR-2025-AVI-0727

Vulnerability from certfr_avis - Published: 2025-08-25 - Updated: 2025-08-25

De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer un déni de service à distance et un problème de sécurité non spécifié par l'éditeur.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
ESET Server Security Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) sans le dernier correctif de sécurité
ESET Mail Security Mail Security pour Microsoft Exchange Server sans le dernier correctif de sécurité
ESET File Security File Security pour Microsoft Azure sans le dernier correctif de sécurité
ESET PROTECT On-Prem PROTECT On-Prem versions 12.1.x antérieures à 12.1.11.0
ESET Security Ultimate Security Ultimate sans le dernier correctif de sécurité
ESET Endpoint Antivirus Endpoint Antivirus pour Windows sans le dernier correctif de sécurité
ESET Endpoint Security Endpoint Security pour Windows sans le dernier correctif de sécurité
ESET Security Security pour Microsoft SharePoint Server sans le dernier correctif de sécurité
ESET Safe Server Safe Server sans le dernier correctif de sécurité
ESET Small Business Security Small Business Security sans le dernier correctif de sécurité
ESET PROTECT On-Prem PROTECT On-Prem versions 11.1.x antérieures à 11.1.18.0
ESET Smart Security Premium Smart Security Premium sans le dernier correctif de sécurité
ESET NOD32 Antivirus NOD32 Antivirus sans le dernier correctif de sécurité
ESET PROTECT On-Prem PROTECT On-Prem versions 12.0.x antérieures à 12.0.15.0
ESET Mail Security Mail Security pour IBM Domino sans le dernier correctif de sécurité
ESET Internet Security Internet Security sans le dernier correctif de sécurité
References
Bulletin de sécurité ESET ca8854 2025-08-21 vendor-advisory
Bulletin de sécurité ESET ca8853 2025-08-21 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Mail Security pour Microsoft Exchange Server sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "File Security pour Microsoft Azure sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "File Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "PROTECT On-Prem versions 12.1.x ant\u00e9rieures \u00e0 12.1.11.0",
      "product": {
        "name": "PROTECT On-Prem",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security Ultimate sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Antivirus pour Windows sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Security pour Windows sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security pour Microsoft SharePoint Server sans le dernier correctif de s\u00e9curit\u00e9\n\n",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Safe Server sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Safe Server",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Small Business Security sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Small Business Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "PROTECT On-Prem versions 11.1.x ant\u00e9rieures \u00e0 11.1.18.0",
      "product": {
        "name": "PROTECT On-Prem",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Smart Security Premium sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "NOD32 Antivirus sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "PROTECT On-Prem versions 12.0.x ant\u00e9rieures \u00e0 12.0.15.0",
      "product": {
        "name": "PROTECT On-Prem",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Mail Security pour IBM Domino sans le dernier correctif de s\u00e9curit\u00e9\n",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Internet Security sans le dernier correctif de s\u00e9curit\u00e9\n",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-8352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8352"
    },
    {
      "name": "CVE-2025-4952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4952"
    },
    {
      "name": "CVE-2025-48976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
    },
    {
      "name": "CVE-2025-48988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
    }
  ],
  "initial_release_date": "2025-08-25T00:00:00",
  "last_revision_date": "2025-08-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0727",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8854",
      "url": "https://support-feed.eset.com/link/15370/17124579/ca8854"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8853",
      "url": "https://support-feed.eset.com/link/15370/17124580/ca8853"
    }
  ]
}

CERTFR-2025-AVI-0623

Vulnerability from certfr_avis - Published: 2025-07-25 - Updated: 2025-07-25

De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer une élévation de privilèges et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
ESET Endpoint Security Endpoint Security versions antérieures à 11.1.2062.0 pour Windows
ESET Small Business Security Small Business Security versions antérieures à 18.2.14.0
ESET Security Security versions 11.x antérieures à 11.1.15005.0 pour Microsoft SharePoint Server
ESET Mail Security Mail Security versions 11.x antérieures à 11.1.10013 pour Microsoft Exchange Server
ESET Internet Security Internet Security versions antérieures à 18.2.14.0
ESET Server Security Server Security versions 12.x antérieures à 12.0.12005.0 pour Windows
ESET Smart Security Premium Smart Security Premium versions antérieures à 18.2.14.0
ESET Security Security versions 12.x antérieures à 12.0.15005.0 pour Microsoft SharePoint Server
ESET Safe Server Safe Server versions antérieures à 18.2.14.0
ESET Security Ultimate Security Ultimate versions antérieures à 18.2.14.0
ESET Server Security Server Security versions 11.x antérieures à 11.1.12013.0 pour Windows
ESET Mail Security Mail Security versions 12.x antérieures à 12.0.10004.0 pour Microsoft Exchange Server
ESET Endpoint Antivirus Endpoint Antivirus versions antérieures à 12.0.2058.0 pour Windows
ESET NOD32 Antivirus NOD32 Antivirus versions antérieures à 18.2.14.0
References
Bulletin de sécurité ESET ca8840 2025-07-16 vendor-advisory
Bulletin de sécurité ESET ca8838 2025-07-09 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2062.0 pour Windows",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Small Business Security versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "Small Business Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security versions 11.x ant\u00e9rieures \u00e0 11.1.15005.0 pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Mail Security versions 11.x ant\u00e9rieures \u00e0 11.1.10013 pour Microsoft Exchange Server",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Internet Security versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Server Security versions 12.x ant\u00e9rieures \u00e0 12.0.12005.0 pour Windows",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Smart Security Premium versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security versions 12.x ant\u00e9rieures \u00e0 12.0.15005.0 pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Safe Server versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "Safe Server",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security Ultimate versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Server Security versions 11.x ant\u00e9rieures \u00e0 11.1.12013.0 pour Windows",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Mail Security versions 12.x ant\u00e9rieures \u00e0 12.0.10004.0 pour Microsoft Exchange Server",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 12.0.2058.0 pour Windows",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "NOD32 Antivirus versions ant\u00e9rieures \u00e0 18.2.14.0",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-5028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5028"
    },
    {
      "name": "CVE-2025-2425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2425"
    }
  ],
  "initial_release_date": "2025-07-25T00:00:00",
  "last_revision_date": "2025-07-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0623",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": "2025-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8840",
      "url": "https://support-feed.eset.com/link/15370/17103529/ca8840"
    },
    {
      "published_at": "2025-07-09",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8838",
      "url": "https://support-feed.eset.com/link/15370/17103530/ca8838"
    }
  ]
}

CERTFR-2025-AVI-0280

Vulnerability from certfr_avis - Published: 2025-04-07 - Updated: 2025-04-07

Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
ESET Smart Security Premium Smart Security Premium versions antériéures à 18.1.10.0
ESET Server Security Server Security versions antérieures à 11.1.12009.0 pour Windows Server
ESET NOD32 Antivirus NOD32 Antivirus versions antériéures à 18.1.10.0
ESET Internet Security Internet Security versions antériéures à 18.1.10.0
ESET Endpoint Security Endpoint Security versions antérieures à 12.0.2045.0
ESET Endpoint Antivirus Endpoint Antivirus versions antérieures à 12.0.2045.0
ESET Mail Security Mail Security versions antérieures à 11.1.10011.0, 11.0.10010.0 et 10.1.10017.0 pour Microsoft Exchange Server
ESET Security Ultimate Security Ultimate versions antériéures à 18.1.10.0
ESET Endpoint Antivirus Endpoint Antivirus versions antérieures à 11.1.2059.0
ESET Security Security versions antérieures à 11.1.15003.0, 11.0.15007.0, 10.0.15008.0 pour Microsoft SharePoint Server
ESET Safe Server ESET Safe Server versions antérieures à 18.1.10.0
ESET Endpoint Security Endpoint Security versions antérieures à 11.1.2059.0
ESET Small Business Security Small Business Security versions antérieures à 18.1.10.0
References
Bulletin de sécurité ESET CA8810 2025-04-04 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Smart Security Premium versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Server Security versions ant\u00e9rieures \u00e0 11.1.12009.0 pour Windows Server",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "NOD32 Antivirus versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Internet Security versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Security versions ant\u00e9rieures \u00e0 12.0.2045.0",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 12.0.2045.0",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Mail Security versions ant\u00e9rieures \u00e0 11.1.10011.0, 11.0.10010.0 et 10.1.10017.0 pour Microsoft Exchange Server",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security Ultimate versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 11.1.2059.0",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Security versions ant\u00e9rieures \u00e0 11.1.15003.0, 11.0.15007.0, 10.0.15008.0 pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Safe Server versions ant\u00e9rieures \u00e0 18.1.10.0",
      "product": {
        "name": "Safe Server",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2059.0",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Small Business Security versions ant\u00e9rieures \u00e0 18.1.10.0",
      "product": {
        "name": "Small Business Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-11859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11859"
    }
  ],
  "initial_release_date": "2025-04-07T00:00:00",
  "last_revision_date": "2025-04-07T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0280",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": "2025-04-04",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET CA8810",
      "url": "https://support-feed.eset.com/link/15370/16999046/ca8810"
    }
  ]
}

CERTFR-2024-AVI-0801

Vulnerability from certfr_avis - Published: 2024-09-23 - Updated: 2024-09-23

De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer une élévation de privilèges et un déni de service.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
ESET Safe Server ESET Safe Server sans le correctif de sécurité Cleaner module 1251
ESET Small Business Security ESET Small Business Security sans le correctif de sécurité Cleaner module 1251
ESET Security Ultimate ESET Security Ultimate sans le correctif de sécurité Cleaner module 1251
ESET Endpoint Security ESET Endpoint Security sans le correctif de sécurité Cleaner module 1251 pour Windows
ESET File Security ESET File Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft Azure
ESET NOD32 Antivirus ESET NOD32 Antivirus sans le correctif de sécurité Cleaner module 1251
ESET Internet Security ESET Internet Security sans le correctif de sécurité Cleaner module 1251
ESET Mail Security ESET Mail Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft Exchange Server et IBM Domino
ESET Smart Security Premium ESET Smart Security Premium sans le correctif de sécurité Cleaner module 1251
ESET Server Security ESET Server Security sans le correctif de sécurité Cleaner module 1251 pour Windows Server
ESET Endpoint Security ESET Endpoint Security versions antérieures à 8.0.7200.0 pour macOS
ESET Cyber Security ESET Cyber Security versions antérieures à 7.5.74.0
ESET Endpoint Antivirus ESET Endpoint Antivirus sans le correctif de sécurité Cleaner module 1251
ESET Security ESET Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft SharePoint Server
References
Bulletin de sécurité ESET ca8725 2024-09-20 vendor-advisory
Bulletin de sécurité ESET ca8726 2024-09-20 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ESET Safe Server sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Safe Server",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Small Business Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Small Business Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security Ultimate sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Windows",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET File Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft Azure",
      "product": {
        "name": "File Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET NOD32 Antivirus sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Internet Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft Exchange Server et IBM Domino ",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Smart Security Premium sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Windows Server",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Security versions ant\u00e9rieures \u00e0 8.0.7200.0 pour macOS ",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Cyber Security versions ant\u00e9rieures \u00e0 7.5.74.0 ",
      "product": {
        "name": "Cyber Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-6654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6654"
    },
    {
      "name": "CVE-2024-7400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7400"
    }
  ],
  "initial_release_date": "2024-09-23T00:00:00",
  "last_revision_date": "2024-09-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0801",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": "2024-09-20",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8725",
      "url": "https://support-feed.eset.com/link/15370/16815452/ca8725"
    },
    {
      "published_at": "2024-09-20",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8726",
      "url": "https://support-feed.eset.com/link/15370/16815451/ca8726"
    }
  ]
}

CERTFR-2024-AVI-0581

Vulnerability from certfr_avis - Published: 2024-07-15 - Updated: 2024-07-15

Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une atteinte à l'intégrité des données et un déni de service.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
ESET Smart Security Premium ESET Smart Security Premium versions antérieures à 17.2.7.0
ESET Mail Security ESET Mail Security versions antérieures à 11.0.10008.0 pour Microsoft Exchange Server
ESET Security ESET Security versions antérieures à 11.0.15004.0 pour Microsoft SharePoint Server
ESET Server Security ESET Server Security versions antérieures à 11.0.12012.0 pour Windows Server
ESET Endpoint Antivirus ESET Endpoint Antivirus versions antérieures à 11.1.2039.0 pour Windows
ESET Security Ultimate ESET Security Ultimate versions antérieures à 17.2.7.0
ESET Internet Security ESET Internet Security versions antérieures à 17.2.7.0
ESET Endpoint Security ESET Endpoint Security versions antérieures à 11.1.2039.0 pour Windows
ESET NOD32 Antivirus ESET NOD32 Antivirus versions antérieures à 17.2.7.0
References
Bulletin de sécurité ESET ca8688 2024-07-12 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ESET Smart Security Premium versions ant\u00e9rieures \u00e0 17.2.7.0",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security versions ant\u00e9rieures \u00e0 11.0.10008.0 pour Microsoft Exchange Server",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security versions ant\u00e9rieures \u00e0 11.0.15004.0 pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security versions ant\u00e9rieures \u00e0 11.0.12012.0 pour Windows Server",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus versions ant\u00e9rieures \u00e0 11.1.2039.0 pour Windows",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security Ultimate versions ant\u00e9rieures \u00e0 17.2.7.0",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": " ESET Internet Security versions ant\u00e9rieures \u00e0 17.2.7.0",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2039.0 pour Windows",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET NOD32 Antivirus versions ant\u00e9rieures \u00e0 17.2.7.0",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-3779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3779"
    }
  ],
  "initial_release_date": "2024-07-15T00:00:00",
  "last_revision_date": "2024-07-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0581",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": "2024-07-12",
      "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8688",
      "url": "https://support-feed.eset.com/link/15370/16741922/ca8688"
    }
  ]
}

CERTFR-2024-AVI-0136

Vulnerability from certfr_avis - Published: 2024-02-15 - Updated: 2024-02-15

Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security ESET Security pour Microsoft SharePoint Server versions 7.3.x.x antérieures à 7.3.15006.0
ESET N/A ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security Premium et ESET Security Ultimate versions antérieures à 17.0.10.0
ESET Mail Security ESET Mail Security pour IBM Domino versions 10.0.x.x antérieures à 10.0.14007.0
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server versions 10.1.x.x antérieures à 10.1.10014.0
ESET Security ESET Security pour Microsoft SharePoint Server versions 9.0.x.x antérieures à 9.0.15006.0
ESET Mail Security ESET Mail Security pour IBM Domino versions 7.3.x.x antérieures à 7.3.14006.0
ESET N/A ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 10.0.x.x antérieures à 10.0.12015.0
ESET Mail Security ESET Mail Security pour IBM Domino versions 8.0.x.x antérieures à 8.0.14014.0
ESET N/A ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.1.x.x antérieures à 10.1.2063.0
ESET N/A ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.0.x.x antérieures à 10.0.2052.0
ESET N/A ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 7.3.x.x antérieures à 7.3.12013.0
ESET N/A ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 8.1.x.x antérieures à 8.1.2062.0
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server versions 9.0.x.x antérieures à 9.0.10012.0
ESET N/A ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 8.0.x.x antérieures à 8.0.12016.0
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server versions 8.0.x.x antérieures à 8.0.10024.0
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server versions 7.3.x.x antérieures à 7.3.10018.0
ESET Security ESET Security pour Microsoft SharePoint Server versions 8.0.x.x antérieures à 8.0.15012.0
ESET Security ESET Security pour Microsoft SharePoint Server versions 10.0.x.x antérieures à 10.0.15005.0
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server versions 10.0.x.x antérieures à 10.0.10018.0
ESET N/A ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 9.1.x.x antérieures à 9.1.2071.0
ESET Mail Security ESET Mail Security pour IBM Domino versions 9.0.x.x antérieures à 9.0.14008.0
ESET N/A ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 9.0.x.x antérieures à 9.0.12019.0
ESET N/A ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 11.0.x.x antérieures à 11.0.2032.0
ESET File Security ESET File Security pour Microsoft Azure

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ESET Security pour Microsoft SharePoint Server versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.15006.0",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security Premium et ESET Security Ultimate versions ant\u00e9rieures \u00e0 17.0.10.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour IBM Domino versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.14007.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server versions 10.1.x.x ant\u00e9rieures \u00e0 10.1.10014.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security pour Microsoft SharePoint Server versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.15006.0",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour IBM Domino versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.14006.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.12015.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour IBM Domino versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.14014.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.1.x.x ant\u00e9rieures \u00e0 10.1.2063.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.2052.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.12013.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 8.1.x.x ant\u00e9rieures \u00e0 8.1.2062.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.10012.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.12016.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.10024.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.10018.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security pour Microsoft SharePoint Server versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.15012.0",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security pour Microsoft SharePoint Server versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.15005.0",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.10018.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 9.1.x.x ant\u00e9rieures \u00e0 9.1.2071.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour IBM Domino versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.14008.0",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.12019.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 11.0.x.x ant\u00e9rieures \u00e0 11.0.2032.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET File Security pour Microsoft Azure",
      "product": {
        "name": "File Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-0353",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0353"
    }
  ],
  "initial_release_date": "2024-02-15T00:00:00",
  "last_revision_date": "2024-02-15T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ESET\u00a0CA8612 du 14 f\u00e9vrier 2024",
      "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed"
    }
  ],
  "reference": "CERTFR-2024-AVI-0136",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits ESET\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 ESET CA8612 du 14 f\u00e9vrier 2024",
      "url": null
    }
  ]
}

CERTFR-2023-AVI-1053

Vulnerability from certfr_avis - Published: 2023-12-22 - Updated: 2023-12-22

Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security Ultimate ESET Security Ultimate
ESET Endpoint Antivirus ESET Endpoint Antivirus versions postérieures à 10.0 pour Linux
ESET Server Security ESET Server Security versions postérieures à 10.1 pour Linux
ESET Endpoint Antivirus ESET Endpoint Antivirus pour Windows
ESET NOD32 Antivirus ESET NOD32 Antivirus
ESET Endpoint Security ESET Endpoint Security pour Windows
ESET Smart Security Premium ESET Smart Security Premium
ESET Mail Security ESET Mail Security pour Microsoft Exchange Server
ESET Internet Security ESET Internet Security
ESET Server Security ESET Server Security pour Windows Server
ESET Mail Security ESET Mail Security pour IBM Domino
ESET Security ESET Security pour Microsoft SharePoint Server
ESET File Security ESET File Security pour Microsoft Azure

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ESET Security Ultimate",
      "product": {
        "name": "Security Ultimate",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus versions post\u00e9rieures \u00e0 10.0 pour Linux",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security versions post\u00e9rieures \u00e0 10.1 pour Linux",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Antivirus pour Windows",
      "product": {
        "name": "Endpoint Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET NOD32 Antivirus",
      "product": {
        "name": "NOD32 Antivirus",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Endpoint Security pour Windows",
      "product": {
        "name": "Endpoint Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Smart Security Premium",
      "product": {
        "name": "Smart Security Premium",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour Microsoft Exchange Server",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Internet Security",
      "product": {
        "name": "Internet Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Server Security pour Windows Server",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Mail Security pour IBM Domino",
      "product": {
        "name": "Mail Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET Security pour Microsoft SharePoint Server",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "ESET File Security pour Microsoft Azure",
      "product": {
        "name": "File Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-5594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5594"
    }
  ],
  "initial_release_date": "2023-12-22T00:00:00",
  "last_revision_date": "2023-12-22T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ESET\u00a0CA8562 du 20 d\u00e9cembre 2023",
      "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed"
    }
  ],
  "reference": "CERTFR-2023-AVI-1053",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-12-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits ESET\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 ESET CA8562 du 20 d\u00e9cembre 2023",
      "url": null
    }
  ]
}

CERTFR-2023-AVI-0764

Vulnerability from certfr_avis - Published: 2023-09-20 - Updated: 2023-09-20

Une vulnérabilité a été découverte dans les produits TrendMicro. Elle permet à un attaquant de provoquer une exécution de code arbitraire.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security TrendMicro Worry-Free Business Security en mode SaaS (WFBSS) sans le correctif mensuel de maintenance du 31 juillet 2023
Trend Micro Apex One TrendMicro Apex One versions 2019 (On-prem) sans le correctif de sécurité SP1 Patch 1 (B12380)
Trend Micro Apex One TrendMicro Apex One en mode SaaS sans le correctif mensuel de sécurité du mois de juillet 2023 (202307)
ESET Security TrendMicro Worry-Free Business Security (WFBS) version 10.0 SP1 sans le correctif de sécurité SP1 Patch 2495

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "TrendMicro Worry-Free Business Security en mode SaaS (WFBSS) sans le correctif mensuel de maintenance du 31 juillet 2023",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "TrendMicro Apex One versions 2019 (On-prem) sans le correctif de s\u00e9curit\u00e9 SP1 Patch 1 (B12380)",
      "product": {
        "name": "Apex One",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "TrendMicro Apex One en mode SaaS sans le correctif mensuel de s\u00e9curit\u00e9 du mois de juillet 2023 (202307)",
      "product": {
        "name": "Apex One",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "TrendMicro Worry-Free Business Security (WFBS) version 10.0 SP1 sans le correctif de s\u00e9curit\u00e9 SP1 Patch 2495",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-41179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41179"
    }
  ],
  "initial_release_date": "2023-09-20T00:00:00",
  "last_revision_date": "2023-09-20T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro\u00a0000294994 du 19 septembre 2023",
      "url": "https://success.trendmicro.com/dcx/s/solution/000294994?language=en_US"
    }
  ],
  "reference": "CERTFR-2023-AVI-0764",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-09-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits TrendMicro\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits TrendMicro",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000294994 du 19 septembre 2023",
      "url": null
    }
  ]
}

CERTFR-2023-AVI-0755

Vulnerability from certfr_avis - Published: 2023-09-15 - Updated: 2023-09-15

De multiples vulnérabilités ont été découvertes dans les produits F-Secure. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft Windows WithSecure Endpoint Protection pour Windows sans le correctif de sécurité automatique 2023-09-11_07
ESET Server Security WithSecure Server Security versions 15 sans le correctif de sécurité automatique 2023-09-11_07
ESET Security WithSecure Client Security versions 15 sans le correctif de sécurité automatique 2023-09-11_07
WithSecure N/A WithSecure Endpoint Protection pour Mac sans le correctif de sécurité automatique 2023-09-11_07
N/A N/A Linux Protection versions 12.0 sans le correctif de sécurité automatique 2023-09-11_07
ESET Security Linux Security 64 versions 12.0 sans le correctif de sécurité automatique 2023-09-11_07
ESET Server Security WithSecure Email and Server Security versions 15 sans le correctif de sécurité automatique 2023-09-11_07
ESET Security WithSecure Client Security pour Mac versions 15 sans le correctif de sécurité automatique 2023-09-11_07
WithSecure N/A WithSecure Endpoint Protection pour Linux sans le correctif de sécurité automatique 2023-09-11_07
WithSecure N/A WithSecure Elements Endpoint Protection versions 17 sans le correctif de sécurité automatique 2023-09-11_07
WithSecure N/A WithSecure Atlant (anciennement F-Secure Atlant) versions 1.0.35-1 sans le correctif de sécurité automatique 2023-09-11_07
WithSecure N/A WithSecure Elements Endpoint Protection pour Mac 17 sans le correctif de sécurité automatique 2023-09-11_07

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WithSecure Endpoint Protection pour Windows sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Server Security versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Client Security versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Endpoint Protection pour Mac sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "Linux Protection versions 12.0 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Linux Security 64 versions 12.0 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Email and Server Security versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Server Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Client Security pour Mac versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Endpoint Protection pour Linux sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Elements Endpoint Protection versions 17 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Atlant (anciennement F-Secure Atlant) versions 1.0.35-1 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Elements Endpoint Protection pour Mac 17 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-42523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42523"
    },
    {
      "name": "CVE-2023-42521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42521"
    },
    {
      "name": "CVE-2023-42524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42524"
    },
    {
      "name": "CVE-2023-42526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42526"
    },
    {
      "name": "CVE-2023-42522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42522"
    }
  ],
  "initial_release_date": "2023-09-15T00:00:00",
  "last_revision_date": "2023-09-15T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure\u00a0cve-2023-42521 du 14 septembre 2023",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42521"
    }
  ],
  "reference": "CERTFR-2023-AVI-0755",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-09-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits F-Secure\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42523 du 14 septembre 2023",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42523"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42521 du 14 septembre 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42526 du 14 septembre 2023",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42526"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42522 du 14 septembre 2023",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42522"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42524 du 14 septembre 2023",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42524"
    }
  ]
}

CERTFR-2023-AVI-0384

Vulnerability from certfr_avis - Published: 2023-05-15 - Updated: 2023-05-15

De multiples vulnérabilités ont été découvertes dans TrendMicro Mobile Security (entreprise). Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security TrendMicro Mobile Security (entreprise) version 9.8 SP5 sans le correctif de sécurité B3284
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "TrendMicro Mobile Security (entreprise) version 9.8 SP5 sans le correctif de s\u00e9curit\u00e9 B3284",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-32523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32523"
    },
    {
      "name": "CVE-2023-32526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32526"
    },
    {
      "name": "CVE-2023-32527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32527"
    },
    {
      "name": "CVE-2023-32528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32528"
    },
    {
      "name": "CVE-2023-32521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32521"
    },
    {
      "name": "CVE-2023-32522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32522"
    },
    {
      "name": "CVE-2023-32524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32524"
    },
    {
      "name": "CVE-2023-32525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32525"
    }
  ],
  "initial_release_date": "2023-05-15T00:00:00",
  "last_revision_date": "2023-05-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0384",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-05-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eTrendMicro Mobile Security (entreprise)\u003c/span\u003e. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans TrendMicro Mobile Security (entreprise)",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000293106 du 12 mai 2023",
      "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US"
    }
  ]
}

CERTFR-2023-AVI-0217

Vulnerability from certfr_avis - Published: 2023-03-14 - Updated: 2023-03-14

De multiples vulnérabilités ont été découvertes dans TrendMicro Worry-Free Business Security. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à l'intégrité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET Security WFBSS versions antérieures à février 2023
ESET Security WFBS version 10.0 SP1 sans le dernier correctif de sécurité 2459
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WFBSS versions ant\u00e9rieures \u00e0 f\u00e9vrier 2023",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "WFBS version 10.0 SP1 sans le dernier correctif de s\u00e9curit\u00e9 2459",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-25146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25146"
    },
    {
      "name": "CVE-2023-25144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25144"
    },
    {
      "name": "CVE-2022-45797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45797"
    },
    {
      "name": "CVE-2023-25148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25148"
    },
    {
      "name": "CVE-2023-25145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25145"
    },
    {
      "name": "CVE-2023-25147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25147"
    }
  ],
  "initial_release_date": "2023-03-14T00:00:00",
  "last_revision_date": "2023-03-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0217",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-03-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans TrendMicro\nWorry-Free Business Security. Elles permettent \u00e0 un attaquant de\nprovoquer un contournement de la politique de s\u00e9curit\u00e9, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans TrendMicro Worry-Free Business Security",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292454 du 13 mars 2023",
      "url": "https://success.trendmicro.com/dcx/s/solution/000292454"
    }
  ]
}

CERTFR-2023-AVI-0106

Vulnerability from certfr_avis - Published: 2023-02-09 - Updated: 2023-02-09

De multiples vulnérabilités ont été corrigées dans TrendMicro. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une élévation de privilèges et une exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Trend Micro Apex One Apex One 2019 sans le correctif de sécurité SP1 b11564
ESET Security Worry-Free Business Security 10.0 SP1 sans le correctif de sécurité Patch 2454
N/A N/A Apex One as a Service sans le correctif de sécurité Build 202301 Security Agent version: 14.0.11960
ESET Security Worry-Free Business Security Services sans le correctif de sécurité (6.7.3064 / 14.2.3044)

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Apex One 2019 sans le correctif de s\u00e9curit\u00e9 SP1 b11564",
      "product": {
        "name": "Apex One",
        "vendor": {
          "name": "Trend Micro",
          "scada": false
        }
      }
    },
    {
      "description": "Worry-Free Business Security 10.0 SP1 sans le correctif de s\u00e9curit\u00e9 Patch 2454",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Apex One as a Service sans le correctif de s\u00e9curit\u00e9 Build 202301 Security Agent version: 14.0.11960",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Worry-Free Business Security Services sans le correctif de s\u00e9curit\u00e9 (6.7.3064 / 14.2.3044)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-25143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25143"
    },
    {
      "name": "CVE-2022-44649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44649"
    },
    {
      "name": "CVE-2023-25146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25146"
    },
    {
      "name": "CVE-2023-25144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25144"
    },
    {
      "name": "CVE-2023-0587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0587"
    },
    {
      "name": "CVE-2022-44650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44650"
    },
    {
      "name": "CVE-2022-45798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45798"
    },
    {
      "name": "CVE-2023-25148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25148"
    },
    {
      "name": "CVE-2023-25145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25145"
    },
    {
      "name": "CVE-2023-25147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25147"
    }
  ],
  "initial_release_date": "2023-02-09T00:00:00",
  "last_revision_date": "2023-02-09T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292209 du 09 f\u00e9vrier 2023",
      "url": "https://success.trendmicro.com/dcx/s/solution/000292209?language=en_US"
    }
  ],
  "reference": "CERTFR-2023-AVI-0106",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-02-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eTrendMicro\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un contournement de la politique de s\u00e9curit\u00e9, une \u00e9l\u00e9vation de\nprivil\u00e8ges et une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits TrendMicro",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292209 du 08 f\u00e9vrier 2023",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292202 du 08 f\u00e9vrier 2023",
      "url": "https://success.trendmicro.com/dcx/s/solution/000292202?language=en_US"
    }
  ]
}

CERTFR-2022-AVI-833

Vulnerability from certfr_avis - Published: 2022-09-20 - Updated: 2022-09-20

Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Contournement provisoire

None
Impacted products
Vendor Product Description
Microsoft Windows WithSecure Endpoint Protection pour Windows 32-bit sans le correctif de sécurité automatique Capricorn 2022-09-13_07
WithSecure N/A WithSecure Collaboration Protection sans le correctif de sécurité automatique Capricorn 2022-09-13_07
ESET Security F-Secure Linux Security 32 sans le correctif de sécurité automatique Capricorn 2022-09-13_07
N/A N/A F-Secure Internet Gatekeeper sans le correctif de sécurité automatique Capricorn 2022-09-13_07
WithSecure N/A WithSecure Cloud Protection for Salesforce sans le correctif de sécurité automatique Capricorn 2022-09-13_07
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WithSecure Endpoint Protection pour Windows 32-bit sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Collaboration Protection sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security 32 sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Internet Gatekeeper sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Cloud Protection for Salesforce sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\n## Contournement provisoire\n",
  "cves": [
    {
      "name": "CVE-2022-28886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28886"
    }
  ],
  "initial_release_date": "2022-09-20T00:00:00",
  "last_revision_date": "2022-09-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-833",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-09-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28886 du 19 septembre 2022",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28886"
    }
  ]
}

CERTFR-2022-AVI-764

Vulnerability from certfr_avis - Published: 2022-08-24 - Updated: 2022-08-24

De multiples vulnérabilités ont été découvertes dans F-Secure les produits F-Secure. Elles permettent à un attaquant de provoquer un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Microsoft N/A F-Secure Internet Gatekeeper
N/A N/A F-Secure Atlant
ESET Security F-Secure Linux Security 64
Microsoft Windows Produits WithSecure Endpoint Protection pour Windows et Mac
WithSecure N/A WithSecure Collaboration Protection
WithSecure N/A WithSecure Cloud Protection for Salesforce
ESET Security F-Secure Linux Security (32-bit)
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Internet Gatekeeper",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Atlant",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security 64",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Produits WithSecure Endpoint Protection pour Windows et Mac",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Collaboration Protection",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Cloud Protection for Salesforce",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (32-bit)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-28883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28883"
    },
    {
      "name": "CVE-2022-28882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28882"
    }
  ],
  "initial_release_date": "2022-08-24T00:00:00",
  "last_revision_date": "2022-08-24T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-764",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-08-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans F-Secure les\nproduits F-Secure. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28883 du 23 ao\u00fbt 2022",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28883"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28882 du 23 ao\u00fbt 2022",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28882"
    }
  ]
}

CERTFR-2022-AVI-708

Vulnerability from certfr_avis - Published: 2022-08-04 - Updated: 2022-08-04

Une vulnérabilité a été découverte dans F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A F-Secure Internet Gatekeeper
N/A N/A F-Secure Atlant
Microsoft Windows Les produits WithSecure endpoint protection pour Windows et Mac
WithSecure N/A WithSecure Collaboration Protection
WithSecure N/A WithSecure Cloud Protection for Salesforce
ESET Security F-Secure Linux Security (64-bit)
ESET Security F-Secure Linux Security (32-bit)
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Internet Gatekeeper",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Atlant",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Les produits WithSecure endpoint protection pour Windows et Mac",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Collaboration Protection",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Cloud Protection for Salesforce",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "WithSecure",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (64-bit)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (32-bit)",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-28880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28880"
    }
  ],
  "initial_release_date": "2022-08-04T00:00:00",
  "last_revision_date": "2022-08-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-708",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-08-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans F-Secure. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28880 du 03 ao\u00fbt 2022",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28880"
    }
  ]
}

CERTFR-2022-AVI-433

Vulnerability from certfr_avis - Published: 2022-05-10 - Updated: 2022-05-10

Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
ESET N/A F-Secure Cloud Protection for Salesforce sans le correctif de sécurité HydraLinux update 2022-04-12_01
N/A N/A F-Secure Internet Gatekeeper sans le correctif de sécurité HydraLinux update 2022-04-12_01
Microsoft Windows WithSecure Endpoint Protection sur Windows et Mac sans le correctif de sécurité HydraLinux update 2022-04-12_01
Microsoft N/A F-Secure Elements for Microsoft 365 sans le correctif de sécurité HydraLinux update 2022-04-12_01
N/A N/A F-Secure Atlant sans le correctif de sécurité HydraLinux update 2022-04-12_01
ESET Security F-Secure Linux Security (32-bit) sans le correctif de sécurité HydraLinux update 2022-04-12_01
ESET Security F-Secure Linux Security 64 sans le correctif de sécurité HydraLinux update 2022-04-12_01
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "F-Secure Cloud Protection for Salesforce sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Internet Gatekeeper sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "WithSecure Endpoint Protection sur Windows et Mac sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Elements for Microsoft 365 sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Atlant sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security (32-bit) sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "F-Secure Linux Security 64 sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-28871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28871"
    }
  ],
  "initial_release_date": "2022-05-10T00:00:00",
  "last_revision_date": "2022-05-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-433",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-05-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 F-Secure du 25 avril 2022",
      "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28871"
    }
  ]
}

CVE-2024-3779 (GCVE-0-2024-3779)

Vulnerability from nvd – Published: 2024-07-16 08:17 – Updated: 2024-08-01 20:20
VLAI?
Title
Denial of Service in ESET products for Windows
Summary
Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-3779",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-16T13:10:29.360811Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-16T13:10:35.421Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:20:01.654Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8688"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Internet Security",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Smart Security Premium",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Security Ultimate",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Endpoint Antivirus for Windows",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.2044.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Endpoint Security for Windows",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.2044.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Server Security for Windows Server",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.12011.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.10005.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.15002.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-07-12T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met."
            }
          ],
          "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-578",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-578 Disable Security Software"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-16T08:17:59.962Z",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "url": "https://support.eset.com/en/ca8688"
        }
      ],
      "source": {
        "advisory": "ca8688",
        "discovery": "UNKNOWN"
      },
      "title": "Denial of Service in ESET products for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2024-3779",
    "datePublished": "2024-07-16T08:17:59.962Z",
    "dateReserved": "2024-04-15T07:03:57.841Z",
    "dateUpdated": "2024-08-01T20:20:01.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-0353 (GCVE-0-2024-0353)

Vulnerability from nvd – Published: 2024-02-15 07:40 – Updated: 2025-12-10 19:33
VLAI?
Title
Local privilege escalation in Windows products
Summary
Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
CWE
  • CWE-269 - Improper Privilege Management
Assigner
Impacted products
Vendor Product Version
ESET, spol. s r.o. ESET NOD32 Antivirus Affected: 0 , ≤ 16.2.15.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Internet Security Affected: 0 , ≤ 16.2.15.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Smart Security Premium Affected: 0 , ≤ 16.2.15.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Security Ultimate Affected: 0 , ≤ 16.2.15.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Endpoint Antivirus for Windows Affected: 0 , ≤ 10.1.2058.0 (custom)
Affected: 0 , ≤ 10.0.2049.0 (custom)
Affected: 0 , ≤ 9.1.2066.0 (custom)
Affected: 0 , ≤ 8.1.2052.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Endpoint Security for Windows Affected: 0 , ≤ 10.1.2058.0 (custom)
Affected: 0 , ≤ 10.0.2049.0 (custom)
Affected: 0 , ≤ 9.1.2066.0 (custom)
Affected: 0 , ≤ 8.1.2052.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Server Security for Windows Server Affected: 0 , ≤ 10.0.12014.0 (custom)
Affected: 0 , ≤ 9.0.12018.0 (custom)
Affected: 0 , ≤ 8.0.12015.0 (custom)
Affected: 0 , ≤ 7.3.12011.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server Affected: 0 , ≤ 10.1.10010.0 (custom)
Affected: 0 , ≤ 10.0.10017.0 (custom)
Affected: 0 , ≤ 9.0.10011.0 (custom)
Affected: 0 , ≤ 8.0.10022.0 (custom)
Affected: 0 , ≤ 7.3.10014.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Mail Security for IBM Domino Affected: 0 , ≤ 10.0.14006.0 (custom)
Affected: 0 , ≤ 9.0.14007.0 (custom)
Affected: 0 , ≤ 8.0.14010.0 (custom)
Affected: 0 , ≤ 7.3.14004.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server Affected: 0 , ≤ 10.0.15004.0 (custom)
Affected: 0 , ≤ 9.0.15005.0 (custom)
Affected: 0 , ≤ 8.0.15011.0 (custom)
Affected: 0 , ≤ 7.3.15004.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET File Security for Microsoft Azure Affected: 0 , ≤ all versions (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-12-10T19:33:58.732Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html"
          },
          {
            "url": "https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html"
          },
          {
            "url": "https://www.exploit-db.com/exploits/51351"
          },
          {
            "url": "https://www.exploit-db.com/exploits/51964"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed"
          }
        ],
        "title": "CVE Program Container",
        "x_generator": {
          "engine": "ADPogram 0.0.1"
        }
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nod32_antivirus",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "16.2.15.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "internet_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "16.2.15.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:smart_security_premium:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "smart_security_premium",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "16.2.15.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:security_ultimate:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "security_ultimate",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "16.2.15.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:windows:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "endpoint_antivirus",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.1.2058.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:windows:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "endpoint_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.1.2058.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "server_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.0.12014.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mail_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.1.10010.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mail_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.0.14006.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.0.15004.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:file_security:-:*:*:*:*:azure:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "file_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-0353",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-20T19:22:48.853538Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-20T19:53:00.534Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "16.2.15.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "16.2.15.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "16.2.15.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Security Ultimate",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "16.2.15.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Endpoint Antivirus for Windows",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.1.2058.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "10.0.2049.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.1.2066.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.1.2052.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Endpoint Security for Windows",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.1.2058.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "10.0.2049.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.1.2066.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.1.2052.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Server Security for Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.0.12014.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.0.12018.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.0.12015.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "7.3.12011.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.1.10010.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "10.0.10017.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.0.10011.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.0.10022.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "7.3.10014.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.0.14006.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.0.14007.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.0.14010.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "7.3.14004.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.0.15004.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.0.15005.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.0.15011.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "7.3.15004.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET File Security for Microsoft Azure",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "all versions",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-02-14T11:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET\u2019s file operations to delete files without having proper permission."
            }
          ],
          "value": "Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET\u2019s file operations to delete files without having proper permission."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-15T07:40:24.786Z",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed"
        }
      ],
      "source": {
        "advisory": "ca8612",
        "discovery": "UNKNOWN"
      },
      "title": "Local privilege escalation in Windows products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2024-0353",
    "datePublished": "2024-02-15T07:40:24.786Z",
    "dateReserved": "2024-01-09T14:21:58.755Z",
    "dateUpdated": "2025-12-10T19:33:58.732Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2023-5594 (GCVE-0-2023-5594)

Vulnerability from nvd – Published: 2023-12-21 11:30 – Updated: 2024-08-02 08:07
VLAI?
Title
Improper following of a certificate's chain of trust in ESET security products
Summary
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
CWE
  • CWE-295 - Improper Certificate Validation
Assigner
Impacted products
Vendor Product Version
ESET, spol. s r.o. ESET NOD32 Antivirus Unaffected: 1464
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:07:32.481Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Security Ultimate",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Endpoint Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Endpoint Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Endpoint Antivirus for Linux 10.0 and above",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Server Security for Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET File Security for Microsoft Azure",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Server Security for Linux 10.1 and above ",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        }
      ],
      "datePublic": "2023-12-20T11:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper validation of the server\u2019s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted."
            }
          ],
          "value": "Improper validation of the server\u2019s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-94",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-94 Man in the Middle Attack"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295 Improper Certificate Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-21T11:30:41.256Z",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed"
        }
      ],
      "source": {
        "advisory": "ca8562",
        "discovery": "UNKNOWN"
      },
      "title": "Improper following of a certificate\u0027s chain of trust\u202fin ESET security products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2023-5594",
    "datePublished": "2023-12-21T11:30:41.256Z",
    "dateReserved": "2023-10-16T08:12:50.985Z",
    "dateUpdated": "2024-08-02T08:07:32.481Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-3160 (GCVE-0-2023-3160)

Vulnerability from nvd – Published: 2023-08-14 09:27 – Updated: 2024-10-09 20:04
VLAI?
Title
Local privilege escalation in security products for Windows
Summary
The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.
CWE
  • CWE-269 - Improper Privilege Management
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:48:07.675Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8466"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-3160",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-09T20:03:59.300075Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-09T20:04:15.607Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Endpoint Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Endpoint Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Server Security for Windows Server (File Security)",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nThe vulnerability potentially allows an attacker to misuse ESET\u2019s file operations during the module update to delete or move files without having proper permissions."
            }
          ],
          "value": "\nThe vulnerability potentially allows an attacker to misuse ESET\u2019s file operations during the module update to delete or move files without having proper permissions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-14T09:27:02.427Z",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "url": "https://support.eset.com/en/ca8466"
        }
      ],
      "source": {
        "advisory": "ca8466",
        "discovery": "EXTERNAL"
      },
      "title": "Local privilege escalation in security products for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2023-3160",
    "datePublished": "2023-08-14T09:27:02.427Z",
    "dateReserved": "2023-06-08T08:28:28.513Z",
    "dateUpdated": "2024-10-09T20:04:15.607Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-37851 (GCVE-0-2021-37851)

Vulnerability from nvd – Published: 2022-05-11 14:08 – Updated: 2024-09-16 22:51
VLAI?
Title
Local Privilege Escalation in ESET product for Windows
Summary
Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:30:08.493Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8268"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "changes": [
                {
                  "at": "8.1.2050.0",
                  "status": "unaffected"
                },
                {
                  "at": "8.0.2053.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "9.0.2046.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "changes": [
                {
                  "at": "8.1.2050.0",
                  "status": "unaffected"
                },
                {
                  "at": "8.0.2053.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "9.0.2046.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Server Security for Microsoft Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "9.0.12012.0",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET File Security for Microsoft Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "affected",
              "version": "6.0 8.0.12013.0"
            }
          ]
        },
        {
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.10020.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.14011.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.15009.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-05-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-11T14:08:03",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.eset.com/en/ca8268"
        }
      ],
      "source": {
        "advisory": "ca8268",
        "discovery": "EXTERNAL"
      },
      "title": "Local Privilege Escalation in ESET product for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@eset.com",
          "DATE_PUBLIC": "2022-05-09T13:00:00.000Z",
          "ID": "CVE-2021-37851",
          "STATE": "PUBLIC",
          "TITLE": "Local Privilege Escalation in ESET product for Windows"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ESET NOD32 Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Internet Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Smart Security Premium",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "9.0.2046.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.1.2050.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.2053.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "9.0.2046.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.1.2050.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.2053.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Server Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "8.0",
                            "version_value": "9.0.12012.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET File Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "6.0",
                            "version_value": "8.0.12013.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for Microsoft Exchange Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.10020.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for IBM Domino",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.14011.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Security for Microsoft SharePoint Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.15009.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ESET, spol. s r.o."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-280 Improper Handling of Insufficient Permissions or Privileges"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.eset.com/en/ca8268",
              "refsource": "MISC",
              "url": "https://support.eset.com/en/ca8268"
            }
          ]
        },
        "source": {
          "advisory": "ca8268",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2021-37851",
    "datePublished": "2022-05-11T14:08:03.466440Z",
    "dateReserved": "2021-08-02T00:00:00",
    "dateUpdated": "2024-09-16T22:51:23.644Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-27167 (GCVE-0-2022-27167)

Vulnerability from nvd – Published: 2022-05-10 19:43 – Updated: 2024-09-16 21:56
VLAI?
Title
Arbitrary File Deletion in ESET products for Windows
Summary
Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:18:39.478Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8268"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "changes": [
                {
                  "at": "8.1.2050.0",
                  "status": "unaffected"
                },
                {
                  "at": "8.0.2053.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "9.0.2046.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "changes": [
                {
                  "at": "8.1.2050.0",
                  "status": "unaffected"
                },
                {
                  "at": "8.0.2053.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "9.0.2046.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Server Security for Microsoft Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "9.0.12012.0",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET File Security for Microsoft Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "affected",
              "version": "6.0 8.0.12013.0"
            }
          ]
        },
        {
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.10020.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.14011.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.15009.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-05-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit \"Repair\" and \"Uninstall\" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-10T19:43:59",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.eset.com/en/ca8268"
        }
      ],
      "source": {
        "advisory": "ca8268",
        "discovery": "EXTERNAL"
      },
      "title": "Arbitrary File Deletion in ESET products for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@eset.com",
          "DATE_PUBLIC": "2022-05-09T13:00:00.000Z",
          "ID": "CVE-2022-27167",
          "STATE": "PUBLIC",
          "TITLE": "Arbitrary File Deletion in ESET products for Windows"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ESET NOD32 Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Internet Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Smart Security Premium",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "9.0.2046.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.1.2050.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.2053.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "9.0.2046.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.1.2050.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.2053.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Server Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "8.0",
                            "version_value": "9.0.12012.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET File Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "6.0",
                            "version_value": "8.0.12013.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for Microsoft Exchange Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.10020.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for IBM Domino",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.14011.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Security for Microsoft SharePoint Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.15009.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ESET, spol. s r.o."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit \"Repair\" and \"Uninstall\" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-280 Improper Handling of Insufficient Permissions or Privileges"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.eset.com/en/ca8268",
              "refsource": "MISC",
              "url": "https://support.eset.com/en/ca8268"
            }
          ]
        },
        "source": {
          "advisory": "ca8268",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2022-27167",
    "datePublished": "2022-05-10T19:43:59.570695Z",
    "dateReserved": "2022-03-14T00:00:00",
    "dateUpdated": "2024-09-16T21:56:50.610Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-37852 (GCVE-0-2021-37852)

Vulnerability from nvd – Published: 2022-02-09 05:14 – Updated: 2024-09-16 23:02
VLAI?
Title
LPE in ESET products for Windows
Summary
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
CWE
  • Privilege Escalation
Assigner
Impacted products
Vendor Product Version
ESET ESET NOD32 Antivirus Affected: 10.0.337.1 , ≤ 15.0.18.0 (custom)
Create a notification for this product.
    ESET ESET Internet Security Affected: 10.0.337.1 , ≤ 15.0.18.0 (custom)
Create a notification for this product.
    ESET ESET Smart Security Affected: 10.0.337.1 , ≤ 15.0.18.0 (custom)
Create a notification for this product.
    ESET ESET Endpoint Antivirus for Windows Affected: 6.6.2046.0 , ≤ 9.0.2032.4 (custom)
Create a notification for this product.
    ESET ESET Endpoint Security for Windows Affected: 6.6.2046.0 , ≤ 9.0.2032.4 (custom)
Create a notification for this product.
    ESET ESET Server Security for Microsoft Windows Server Affected: 8.0.12003.0 , ≤ 8.0.12003.1 (custom)
Create a notification for this product.
    ESET ESET File Security for Microsoft Windows Server Affected: 7.0.12014.0 , ≤ 7.3.12006.0 (custom)
Create a notification for this product.
    ESET ESET Server Security for Microsoft Azure Affected: 7.0.12016.1002 , ≤ 7.2.12004.1000 (custom)
Create a notification for this product.
    ESET ESET Security for Microsoft SharePoint Server Affected: 7.0.15008.0 , ≤ 8.0.15004.0 (custom)
Create a notification for this product.
    ESET ESET Mail Security for IBM Domino Affected: 7.0.14008.0 , ≤ 8.0.14004.0 (custom)
Create a notification for this product.
    ESET ESET Mail Security for Microsoft Exchange Server Affected: 7.0.10019 , ≤ 8.0.10016.0 (custom)
Create a notification for this product.
Credits
Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:30:09.085Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "15.0.18.0",
              "status": "affected",
              "version": "10.0.337.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Internet Security",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "15.0.18.0",
              "status": "affected",
              "version": "10.0.337.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Smart Security",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "15.0.18.0",
              "status": "affected",
              "version": "10.0.337.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Antivirus for Windows",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "9.0.2032.4",
              "status": "affected",
              "version": "6.6.2046.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Security for Windows",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "9.0.2032.4",
              "status": "affected",
              "version": "6.6.2046.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Server Security for Microsoft Windows Server",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "8.0.12003.1",
              "status": "affected",
              "version": "8.0.12003.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET File Security for Microsoft Windows Server",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "7.3.12006.0",
              "status": "affected",
              "version": "7.0.12014.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Server Security for Microsoft Azure",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "7.2.12004.1000",
              "status": "affected",
              "version": "7.0.12016.1002",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "8.0.15004.0",
              "status": "affected",
              "version": "7.0.15008.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "8.0.14004.0",
              "status": "affected",
              "version": "7.0.14008.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "8.0.10016.0",
              "status": "affected",
              "version": "7.0.10019",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative"
        }
      ],
      "datePublic": "2022-01-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Privilege Escalation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T05:14:13",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/"
        }
      ],
      "source": {
        "advisory": "CA8223",
        "discovery": "EXTERNAL"
      },
      "title": "LPE in ESET products for Windows",
      "workarounds": [
        {
          "lang": "en",
          "value": "The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in ESET products\u00e2\u20ac\u2122 Advanced setup.\n\nHowever, ESET strongly recommends performing an upgrade to a fixed product version and only applying this workaround when the upgrade is not possible for an important reason."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@eset.com",
          "DATE_PUBLIC": "2022-01-31T09:00:00.000Z",
          "ID": "CVE-2021-37852",
          "STATE": "PUBLIC",
          "TITLE": "LPE in ESET products for Windows"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ESET NOD32 Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "10.0.337.1",
                            "version_value": "15.0.18.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Internet Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "10.0.337.1",
                            "version_value": "15.0.18.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Smart Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "10.0.337.1",
                            "version_value": "15.0.18.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Antivirus for Windows",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "6.6.2046.0",
                            "version_value": "9.0.2032.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Security for Windows",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "6.6.2046.0",
                            "version_value": "9.0.2032.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Server Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "8.0.12003.0",
                            "version_value": "8.0.12003.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET File Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "7.0.12014.0",
                            "version_value": "7.3.12006.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Server Security for Microsoft Azure",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "7.0.12016.1002",
                            "version_value": "7.2.12004.1000"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Security for Microsoft SharePoint Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "7.0.15008.0",
                            "version_value": "8.0.15004.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for IBM Domino",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "7.0.14008.0",
                            "version_value": "8.0.14004.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for Microsoft Exchange Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "7.0.10019",
                            "version_value": "8.0.10016.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ESET"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Privilege Escalation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows",
              "refsource": "MISC",
              "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/"
            }
          ]
        },
        "source": {
          "advisory": "CA8223",
          "discovery": "EXTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in ESET products\u00e2\u20ac\u2122 Advanced setup.\n\nHowever, ESET strongly recommends performing an upgrade to a fixed product version and only applying this workaround when the upgrade is not possible for an important reason."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2021-37852",
    "datePublished": "2022-02-09T05:14:13.627605Z",
    "dateReserved": "2021-08-02T00:00:00",
    "dateUpdated": "2024-09-16T23:02:00.516Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-3779 (GCVE-0-2024-3779)

Vulnerability from cvelistv5 – Published: 2024-07-16 08:17 – Updated: 2024-08-01 20:20
VLAI?
Title
Denial of Service in ESET products for Windows
Summary
Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-3779",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-16T13:10:29.360811Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-16T13:10:35.421Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:20:01.654Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8688"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Internet Security",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Smart Security Premium",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Security Ultimate",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Endpoint Antivirus for Windows",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.2044.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Endpoint Security for Windows",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.2044.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Server Security for Windows Server",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.12011.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.10005.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.15002.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-07-12T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met."
            }
          ],
          "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-578",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-578 Disable Security Software"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-16T08:17:59.962Z",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "url": "https://support.eset.com/en/ca8688"
        }
      ],
      "source": {
        "advisory": "ca8688",
        "discovery": "UNKNOWN"
      },
      "title": "Denial of Service in ESET products for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2024-3779",
    "datePublished": "2024-07-16T08:17:59.962Z",
    "dateReserved": "2024-04-15T07:03:57.841Z",
    "dateUpdated": "2024-08-01T20:20:01.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-0353 (GCVE-0-2024-0353)

Vulnerability from cvelistv5 – Published: 2024-02-15 07:40 – Updated: 2025-12-10 19:33
VLAI?
Title
Local privilege escalation in Windows products
Summary
Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
CWE
  • CWE-269 - Improper Privilege Management
Assigner
Impacted products
Vendor Product Version
ESET, spol. s r.o. ESET NOD32 Antivirus Affected: 0 , ≤ 16.2.15.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Internet Security Affected: 0 , ≤ 16.2.15.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Smart Security Premium Affected: 0 , ≤ 16.2.15.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Security Ultimate Affected: 0 , ≤ 16.2.15.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Endpoint Antivirus for Windows Affected: 0 , ≤ 10.1.2058.0 (custom)
Affected: 0 , ≤ 10.0.2049.0 (custom)
Affected: 0 , ≤ 9.1.2066.0 (custom)
Affected: 0 , ≤ 8.1.2052.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Endpoint Security for Windows Affected: 0 , ≤ 10.1.2058.0 (custom)
Affected: 0 , ≤ 10.0.2049.0 (custom)
Affected: 0 , ≤ 9.1.2066.0 (custom)
Affected: 0 , ≤ 8.1.2052.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Server Security for Windows Server Affected: 0 , ≤ 10.0.12014.0 (custom)
Affected: 0 , ≤ 9.0.12018.0 (custom)
Affected: 0 , ≤ 8.0.12015.0 (custom)
Affected: 0 , ≤ 7.3.12011.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server Affected: 0 , ≤ 10.1.10010.0 (custom)
Affected: 0 , ≤ 10.0.10017.0 (custom)
Affected: 0 , ≤ 9.0.10011.0 (custom)
Affected: 0 , ≤ 8.0.10022.0 (custom)
Affected: 0 , ≤ 7.3.10014.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Mail Security for IBM Domino Affected: 0 , ≤ 10.0.14006.0 (custom)
Affected: 0 , ≤ 9.0.14007.0 (custom)
Affected: 0 , ≤ 8.0.14010.0 (custom)
Affected: 0 , ≤ 7.3.14004.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server Affected: 0 , ≤ 10.0.15004.0 (custom)
Affected: 0 , ≤ 9.0.15005.0 (custom)
Affected: 0 , ≤ 8.0.15011.0 (custom)
Affected: 0 , ≤ 7.3.15004.0 (custom)
Create a notification for this product.
    ESET, spol. s r.o. ESET File Security for Microsoft Azure Affected: 0 , ≤ all versions (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-12-10T19:33:58.732Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html"
          },
          {
            "url": "https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html"
          },
          {
            "url": "https://www.exploit-db.com/exploits/51351"
          },
          {
            "url": "https://www.exploit-db.com/exploits/51964"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed"
          }
        ],
        "title": "CVE Program Container",
        "x_generator": {
          "engine": "ADPogram 0.0.1"
        }
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nod32_antivirus",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "16.2.15.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "internet_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "16.2.15.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:smart_security_premium:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "smart_security_premium",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "16.2.15.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:security_ultimate:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "security_ultimate",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "16.2.15.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:endpoint_antivirus:-:*:*:*:*:windows:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "endpoint_antivirus",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.1.2058.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:endpoint_security:-:*:*:*:*:windows:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "endpoint_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.1.2058.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:server_security:-:*:*:*:*:windows_server:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "server_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.0.12014.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:mail_security:-:*:*:*:*:exchange_server:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mail_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.1.10010.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "mail_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.0.14006.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:security:-:*:*:*:*:sharepoint_server:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "10.0.15004.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:eset:file_security:-:*:*:*:*:azure:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "file_security",
            "vendor": "eset",
            "versions": [
              {
                "lessThanOrEqual": "*",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-0353",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-20T19:22:48.853538Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-20T19:53:00.534Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "16.2.15.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "16.2.15.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "16.2.15.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Security Ultimate",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "16.2.15.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Endpoint Antivirus for Windows",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.1.2058.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "10.0.2049.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.1.2066.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.1.2052.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Endpoint Security for Windows",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.1.2058.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "10.0.2049.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.1.2066.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.1.2052.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Server Security for Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.0.12014.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.0.12018.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.0.12015.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "7.3.12011.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.1.10010.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "10.0.10017.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.0.10011.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.0.10022.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "7.3.10014.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.0.14006.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.0.14007.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.0.14010.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "7.3.14004.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "10.0.15004.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "9.0.15005.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "8.0.15011.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "7.3.15004.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET File Security for Microsoft Azure",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThanOrEqual": "all versions",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-02-14T11:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET\u2019s file operations to delete files without having proper permission."
            }
          ],
          "value": "Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET\u2019s file operations to delete files without having proper permission."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-15T07:40:24.786Z",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed"
        }
      ],
      "source": {
        "advisory": "ca8612",
        "discovery": "UNKNOWN"
      },
      "title": "Local privilege escalation in Windows products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2024-0353",
    "datePublished": "2024-02-15T07:40:24.786Z",
    "dateReserved": "2024-01-09T14:21:58.755Z",
    "dateUpdated": "2025-12-10T19:33:58.732Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2023-5594 (GCVE-0-2023-5594)

Vulnerability from cvelistv5 – Published: 2023-12-21 11:30 – Updated: 2024-08-02 08:07
VLAI?
Title
Improper following of a certificate's chain of trust in ESET security products
Summary
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
CWE
  • CWE-295 - Improper Certificate Validation
Assigner
Impacted products
Vendor Product Version
ESET, spol. s r.o. ESET NOD32 Antivirus Unaffected: 1464
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:07:32.481Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Security Ultimate",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Endpoint Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Endpoint Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Endpoint Antivirus for Linux 10.0 and above",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Server Security for Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET File Security for Microsoft Azure",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Internet protection module"
          ],
          "product": "ESET Server Security for Linux 10.1 and above ",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1464"
            }
          ]
        }
      ],
      "datePublic": "2023-12-20T11:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper validation of the server\u2019s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted."
            }
          ],
          "value": "Improper validation of the server\u2019s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-94",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-94 Man in the Middle Attack"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295 Improper Certificate Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-21T11:30:41.256Z",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed"
        }
      ],
      "source": {
        "advisory": "ca8562",
        "discovery": "UNKNOWN"
      },
      "title": "Improper following of a certificate\u0027s chain of trust\u202fin ESET security products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2023-5594",
    "datePublished": "2023-12-21T11:30:41.256Z",
    "dateReserved": "2023-10-16T08:12:50.985Z",
    "dateUpdated": "2024-08-02T08:07:32.481Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-3160 (GCVE-0-2023-3160)

Vulnerability from cvelistv5 – Published: 2023-08-14 09:27 – Updated: 2024-10-09 20:04
VLAI?
Title
Local privilege escalation in security products for Windows
Summary
The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.
CWE
  • CWE-269 - Improper Privilege Management
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:48:07.675Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8466"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-3160",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-09T20:03:59.300075Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-09T20:04:15.607Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Endpoint Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Endpoint Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Server Security for Windows Server (File Security)",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "HIPS"
          ],
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "unaffected",
              "version": "1463"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nThe vulnerability potentially allows an attacker to misuse ESET\u2019s file operations during the module update to delete or move files without having proper permissions."
            }
          ],
          "value": "\nThe vulnerability potentially allows an attacker to misuse ESET\u2019s file operations during the module update to delete or move files without having proper permissions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-14T09:27:02.427Z",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "url": "https://support.eset.com/en/ca8466"
        }
      ],
      "source": {
        "advisory": "ca8466",
        "discovery": "EXTERNAL"
      },
      "title": "Local privilege escalation in security products for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2023-3160",
    "datePublished": "2023-08-14T09:27:02.427Z",
    "dateReserved": "2023-06-08T08:28:28.513Z",
    "dateUpdated": "2024-10-09T20:04:15.607Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-37851 (GCVE-0-2021-37851)

Vulnerability from cvelistv5 – Published: 2022-05-11 14:08 – Updated: 2024-09-16 22:51
VLAI?
Title
Local Privilege Escalation in ESET product for Windows
Summary
Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:30:08.493Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8268"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "changes": [
                {
                  "at": "8.1.2050.0",
                  "status": "unaffected"
                },
                {
                  "at": "8.0.2053.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "9.0.2046.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "changes": [
                {
                  "at": "8.1.2050.0",
                  "status": "unaffected"
                },
                {
                  "at": "8.0.2053.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "9.0.2046.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Server Security for Microsoft Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "9.0.12012.0",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET File Security for Microsoft Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "affected",
              "version": "6.0 8.0.12013.0"
            }
          ]
        },
        {
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.10020.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.14011.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.15009.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-05-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-11T14:08:03",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.eset.com/en/ca8268"
        }
      ],
      "source": {
        "advisory": "ca8268",
        "discovery": "EXTERNAL"
      },
      "title": "Local Privilege Escalation in ESET product for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@eset.com",
          "DATE_PUBLIC": "2022-05-09T13:00:00.000Z",
          "ID": "CVE-2021-37851",
          "STATE": "PUBLIC",
          "TITLE": "Local Privilege Escalation in ESET product for Windows"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ESET NOD32 Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Internet Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Smart Security Premium",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "9.0.2046.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.1.2050.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.2053.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "9.0.2046.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.1.2050.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.2053.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Server Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "8.0",
                            "version_value": "9.0.12012.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET File Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "6.0",
                            "version_value": "8.0.12013.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for Microsoft Exchange Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.10020.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for IBM Domino",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.14011.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Security for Microsoft SharePoint Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.15009.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ESET, spol. s r.o."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-280 Improper Handling of Insufficient Permissions or Privileges"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.eset.com/en/ca8268",
              "refsource": "MISC",
              "url": "https://support.eset.com/en/ca8268"
            }
          ]
        },
        "source": {
          "advisory": "ca8268",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2021-37851",
    "datePublished": "2022-05-11T14:08:03.466440Z",
    "dateReserved": "2021-08-02T00:00:00",
    "dateUpdated": "2024-09-16T22:51:23.644Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-27167 (GCVE-0-2022-27167)

Vulnerability from cvelistv5 – Published: 2022-05-10 19:43 – Updated: 2024-09-16 21:56
VLAI?
Title
Arbitrary File Deletion in ESET products for Windows
Summary
Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:18:39.478Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8268"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "changes": [
                {
                  "at": "8.1.2050.0",
                  "status": "unaffected"
                },
                {
                  "at": "8.0.2053.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "9.0.2046.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "changes": [
                {
                  "at": "8.1.2050.0",
                  "status": "unaffected"
                },
                {
                  "at": "8.0.2053.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "9.0.2046.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Server Security for Microsoft Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "9.0.12012.0",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET File Security for Microsoft Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "affected",
              "version": "6.0 8.0.12013.0"
            }
          ]
        },
        {
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.10020.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.14011.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.15009.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-05-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit \"Repair\" and \"Uninstall\" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-10T19:43:59",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.eset.com/en/ca8268"
        }
      ],
      "source": {
        "advisory": "ca8268",
        "discovery": "EXTERNAL"
      },
      "title": "Arbitrary File Deletion in ESET products for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@eset.com",
          "DATE_PUBLIC": "2022-05-09T13:00:00.000Z",
          "ID": "CVE-2022-27167",
          "STATE": "PUBLIC",
          "TITLE": "Arbitrary File Deletion in ESET products for Windows"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ESET NOD32 Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Internet Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Smart Security Premium",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "9.0.2046.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.1.2050.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.2053.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "9.0.2046.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.1.2050.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.2053.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Server Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "8.0",
                            "version_value": "9.0.12012.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET File Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "6.0",
                            "version_value": "8.0.12013.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for Microsoft Exchange Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.10020.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for IBM Domino",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.14011.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Security for Microsoft SharePoint Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.15009.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ESET, spol. s r.o."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit \"Repair\" and \"Uninstall\" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-280 Improper Handling of Insufficient Permissions or Privileges"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.eset.com/en/ca8268",
              "refsource": "MISC",
              "url": "https://support.eset.com/en/ca8268"
            }
          ]
        },
        "source": {
          "advisory": "ca8268",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2022-27167",
    "datePublished": "2022-05-10T19:43:59.570695Z",
    "dateReserved": "2022-03-14T00:00:00",
    "dateUpdated": "2024-09-16T21:56:50.610Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-37852 (GCVE-0-2021-37852)

Vulnerability from cvelistv5 – Published: 2022-02-09 05:14 – Updated: 2024-09-16 23:02
VLAI?
Title
LPE in ESET products for Windows
Summary
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
CWE
  • Privilege Escalation
Assigner
Impacted products
Vendor Product Version
ESET ESET NOD32 Antivirus Affected: 10.0.337.1 , ≤ 15.0.18.0 (custom)
Create a notification for this product.
    ESET ESET Internet Security Affected: 10.0.337.1 , ≤ 15.0.18.0 (custom)
Create a notification for this product.
    ESET ESET Smart Security Affected: 10.0.337.1 , ≤ 15.0.18.0 (custom)
Create a notification for this product.
    ESET ESET Endpoint Antivirus for Windows Affected: 6.6.2046.0 , ≤ 9.0.2032.4 (custom)
Create a notification for this product.
    ESET ESET Endpoint Security for Windows Affected: 6.6.2046.0 , ≤ 9.0.2032.4 (custom)
Create a notification for this product.
    ESET ESET Server Security for Microsoft Windows Server Affected: 8.0.12003.0 , ≤ 8.0.12003.1 (custom)
Create a notification for this product.
    ESET ESET File Security for Microsoft Windows Server Affected: 7.0.12014.0 , ≤ 7.3.12006.0 (custom)
Create a notification for this product.
    ESET ESET Server Security for Microsoft Azure Affected: 7.0.12016.1002 , ≤ 7.2.12004.1000 (custom)
Create a notification for this product.
    ESET ESET Security for Microsoft SharePoint Server Affected: 7.0.15008.0 , ≤ 8.0.15004.0 (custom)
Create a notification for this product.
    ESET ESET Mail Security for IBM Domino Affected: 7.0.14008.0 , ≤ 8.0.14004.0 (custom)
Create a notification for this product.
    ESET ESET Mail Security for Microsoft Exchange Server Affected: 7.0.10019 , ≤ 8.0.10016.0 (custom)
Create a notification for this product.
Credits
Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:30:09.085Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "15.0.18.0",
              "status": "affected",
              "version": "10.0.337.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Internet Security",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "15.0.18.0",
              "status": "affected",
              "version": "10.0.337.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Smart Security",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "15.0.18.0",
              "status": "affected",
              "version": "10.0.337.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Antivirus for Windows",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "9.0.2032.4",
              "status": "affected",
              "version": "6.6.2046.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Security for Windows",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "9.0.2032.4",
              "status": "affected",
              "version": "6.6.2046.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Server Security for Microsoft Windows Server",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "8.0.12003.1",
              "status": "affected",
              "version": "8.0.12003.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET File Security for Microsoft Windows Server",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "7.3.12006.0",
              "status": "affected",
              "version": "7.0.12014.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Server Security for Microsoft Azure",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "7.2.12004.1000",
              "status": "affected",
              "version": "7.0.12016.1002",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "8.0.15004.0",
              "status": "affected",
              "version": "7.0.15008.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "8.0.14004.0",
              "status": "affected",
              "version": "7.0.14008.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET",
          "versions": [
            {
              "lessThanOrEqual": "8.0.10016.0",
              "status": "affected",
              "version": "7.0.10019",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative"
        }
      ],
      "datePublic": "2022-01-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Privilege Escalation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T05:14:13",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/"
        }
      ],
      "source": {
        "advisory": "CA8223",
        "discovery": "EXTERNAL"
      },
      "title": "LPE in ESET products for Windows",
      "workarounds": [
        {
          "lang": "en",
          "value": "The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in ESET products\u00e2\u20ac\u2122 Advanced setup.\n\nHowever, ESET strongly recommends performing an upgrade to a fixed product version and only applying this workaround when the upgrade is not possible for an important reason."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@eset.com",
          "DATE_PUBLIC": "2022-01-31T09:00:00.000Z",
          "ID": "CVE-2021-37852",
          "STATE": "PUBLIC",
          "TITLE": "LPE in ESET products for Windows"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ESET NOD32 Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "10.0.337.1",
                            "version_value": "15.0.18.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Internet Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "10.0.337.1",
                            "version_value": "15.0.18.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Smart Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "10.0.337.1",
                            "version_value": "15.0.18.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Antivirus for Windows",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "6.6.2046.0",
                            "version_value": "9.0.2032.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Security for Windows",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "6.6.2046.0",
                            "version_value": "9.0.2032.4"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Server Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "8.0.12003.0",
                            "version_value": "8.0.12003.1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET File Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "7.0.12014.0",
                            "version_value": "7.3.12006.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Server Security for Microsoft Azure",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "7.0.12016.1002",
                            "version_value": "7.2.12004.1000"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Security for Microsoft SharePoint Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "7.0.15008.0",
                            "version_value": "8.0.15004.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for IBM Domino",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "7.0.14008.0",
                            "version_value": "8.0.14004.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for Microsoft Exchange Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "7.0.10019",
                            "version_value": "8.0.10016.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ESET"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Privilege Escalation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows",
              "refsource": "MISC",
              "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/"
            }
          ]
        },
        "source": {
          "advisory": "CA8223",
          "discovery": "EXTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in ESET products\u00e2\u20ac\u2122 Advanced setup.\n\nHowever, ESET strongly recommends performing an upgrade to a fixed product version and only applying this workaround when the upgrade is not possible for an important reason."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2021-37852",
    "datePublished": "2022-02-09T05:14:13.627605Z",
    "dateReserved": "2021-08-02T00:00:00",
    "dateUpdated": "2024-09-16T23:02:00.516Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}