Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
References
Configurations
Configuration 1 (hide)
|
History
23 Jan 2025, 17:18
Type | Values Removed | Values Added |
---|---|---|
First Time |
Eset
Eset file Security Eset security Eset internet Security Eset endpoint Antivirus Eset nod32 Antivirus Eset server Security Eset endpoint Security Eset mail Security Eset smart Security |
|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:* cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:* cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:* cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:* cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:* cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:* cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:* cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:* cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:* cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:* cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:* |
|
References | () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed - Vendor Advisory | |
References | () https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html - Broken Link | |
References | () https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html - Broken Link |
Information
Published : 2024-02-15 08:15
Updated : 2025-01-23 17:18
NVD link : CVE-2024-0353
Mitre link : CVE-2024-0353
CVE.ORG link : CVE-2024-0353
JSON object : View
Products Affected
eset
- file_security
- smart_security
- endpoint_antivirus
- internet_security
- mail_security
- nod32_antivirus
- server_security
- security
- endpoint_security
CWE