CVE-2024-0353

Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:*
cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*

History

23 Jan 2025, 17:18

Type Values Removed Values Added
References () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed - () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed - Vendor Advisory
References () https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html - () https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html - Broken Link
References () https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html - () https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html - Broken Link
First Time Eset security
Eset server Security
Eset nod32 Antivirus
Eset endpoint Security
Eset smart Security
Eset mail Security
Eset file Security
Eset internet Security
Eset
Eset endpoint Antivirus
CPE cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
CWE NVD-CWE-noinfo

25 Nov 2024, 19:15

Type Values Removed Values Added
References
  • () https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html -
  • () https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html -

21 Nov 2024, 08:46

Type Values Removed Values Added
Summary
  • (es) La vulnerabilidad de escalada de privilegios local potencialmente permitió a un atacante hacer un mal uso de las operaciones de archivos de ESET para eliminar archivos sin tener el permiso adecuado.
References () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed - () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed -

15 Feb 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-15 08:15

Updated : 2025-01-23 17:18


NVD link : CVE-2024-0353

Mitre link : CVE-2024-0353

CVE.ORG link : CVE-2024-0353


JSON object : View

Products Affected

eset

  • mail_security
  • smart_security
  • nod32_antivirus
  • endpoint_security
  • server_security
  • endpoint_antivirus
  • file_security
  • security
  • internet_security
CWE
CWE-269

Improper Privilege Management

NVD-CWE-noinfo