2024-02-15 09:01:16 +00:00
{
"id" : "CVE-2024-0353" ,
"sourceIdentifier" : "security@eset.com" ,
"published" : "2024-02-15T08:15:46.023" ,
2025-01-23 19:03:50 +00:00
"lastModified" : "2025-01-23T17:18:06.060" ,
"vulnStatus" : "Analyzed" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2024-02-15 09:01:16 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET\u2019s file operations to delete files without having proper permission."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "La vulnerabilidad de escalada de privilegios local potencialmente permiti\u00f3 a un atacante hacer un mal uso de las operaciones de archivos de ESET para eliminar archivos sin tener el permiso adecuado."
2024-02-15 09:01:16 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security@eset.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-11-25 21:08:02 +00:00
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2024-02-15 09:01:16 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-25 21:08:02 +00:00
"availabilityImpact" : "HIGH"
2024-02-15 09:01:16 +00:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
2025-01-23 19:03:50 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
2024-02-15 09:01:16 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "security@eset.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-269"
}
]
2025-01-23 19:03:50 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*" ,
"versionEndExcluding" : "8.1.2062.0" ,
"matchCriteriaId" : "FD0A2DF6-7A58-491C-AEB8-A2E680AC98F1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "9.0" ,
"versionEndExcluding" : "9.1.2071.0" ,
"matchCriteriaId" : "05E9177E-5D0F-41ED-8294-DFB89E3876E4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "10.0" ,
"versionEndExcluding" : "10.0.2052.0" ,
"matchCriteriaId" : "0B60BF84-00BE-4DB0-8997-743F57416BE4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "10.1" ,
"versionEndExcluding" : "10.1.2063.0" ,
"matchCriteriaId" : "0164AE41-F12C-4B0D-8974-D7437BFB06B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "11.0" ,
"versionEndExcluding" : "11.0.2032.0" ,
"matchCriteriaId" : "4E612901-DB52-4059-9817-92C60A84BB2C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*" ,
"versionEndExcluding" : "8.1.2062.0" ,
"matchCriteriaId" : "74C3F07A-2298-4521-BBC0-F2E48BA982F9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "9.0" ,
"versionEndExcluding" : "9.1.2071.0" ,
"matchCriteriaId" : "B3D79959-D8FE-4F95-A8E8-03308948FC5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "10.0" ,
"versionEndExcluding" : "10.0.2052.0" ,
"matchCriteriaId" : "346C043C-2DE2-490B-A36B-8D0970DFD4B6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "10.1" ,
"versionEndExcluding" : "10.1.2063.0" ,
"matchCriteriaId" : "71A365AB-99CA-4FA9-A451-5C96B0A5A7F5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "11.0" ,
"versionEndExcluding" : "11.0.2032.0" ,
"matchCriteriaId" : "395C3173-EDC0-41D7-85B2-612C4DBD98F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:*" ,
"matchCriteriaId" : "1AB25077-C346-4D68-8089-6042BFDA655C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "17.0.10.0" ,
"matchCriteriaId" : "BA4D106F-E8B7-43E9-A568-D779AE96128B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*" ,
"versionEndExcluding" : "7.3.10018.0" ,
"matchCriteriaId" : "130C22A6-09A5-4271-9777-E0104049B549"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*" ,
"versionEndExcluding" : "7.3.14006.0" ,
"matchCriteriaId" : "3907201A-AB03-472D-888E-C2F4263FF142"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*" ,
"versionStartIncluding" : "8.0" ,
"versionEndExcluding" : "8.0.10024.0" ,
"matchCriteriaId" : "222094AC-A5B4-4951-8A66-DE4230E2480F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*" ,
"versionStartIncluding" : "8.0" ,
"versionEndExcluding" : "8.0.14014.0" ,
"matchCriteriaId" : "050BA9DE-6985-4833-90C6-60018F521995"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*" ,
"versionStartIncluding" : "9.0" ,
"versionEndExcluding" : "9.0.10012.0" ,
"matchCriteriaId" : "FE6862D1-1DC9-492E-B1A7-21DC8F5102C4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*" ,
"versionStartIncluding" : "9.0" ,
"versionEndExcluding" : "9.0.14008.0" ,
"matchCriteriaId" : "EDB3A57E-7B60-4FAC-BE08-DF10CE47C8E2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*" ,
"versionStartIncluding" : "10.0" ,
"versionEndExcluding" : "10.0.10018.0" ,
"matchCriteriaId" : "33552BAC-3DD8-4367-AFD3-ACF6A4B0EC15"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*" ,
"versionStartIncluding" : "10.0" ,
"versionEndExcluding" : "10.0.14007.0" ,
"matchCriteriaId" : "45C8E944-C3B4-4AB7-8332-F51821F7C253"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*" ,
"versionStartIncluding" : "10.1" ,
"versionEndExcluding" : "10.1.10014.0" ,
"matchCriteriaId" : "AE42F470-97D5-405F-8DDB-58030A8A7339"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "17.0.10.0" ,
"matchCriteriaId" : "3B0F994D-291F-4037-9F38-2ADD30917A1B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*" ,
"versionEndExcluding" : "7.3.15006.0" ,
"matchCriteriaId" : "B1008F99-C3F2-4D79-A37D-2239E7C5535F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*" ,
"versionEndExcluding" : "17.0.10.0" ,
"matchCriteriaId" : "F78781C7-AD74-4D14-A955-A0380CE7B73F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*" ,
"versionStartIncluding" : "8.0" ,
"versionEndExcluding" : "8.0.15012.0" ,
"matchCriteriaId" : "732DD0AC-2D36-41E5-9005-3BA04D2BC920"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*" ,
"versionStartIncluding" : "9.0" ,
"versionEndExcluding" : "9.0.15006.0" ,
"matchCriteriaId" : "61D23E98-F343-41C8-A9CB-14937455AF7E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*" ,
"versionStartIncluding" : "10.0" ,
"versionEndExcluding" : "10.0.15005.0" ,
"matchCriteriaId" : "EDEE8E3A-1A7B-4DBC-9C2A-6A7E4BB1B9B3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*" ,
"versionEndExcluding" : "7.3.12013.0" ,
"matchCriteriaId" : "91DE9E8D-6155-42BB-A303-4A31B3A65C49"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*" ,
"versionStartIncluding" : "8.0" ,
"versionEndExcluding" : "8.0.12016.0" ,
"matchCriteriaId" : "C2722856-080B-4025-AD29-7B758303F442"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*" ,
"versionStartIncluding" : "9.0" ,
"versionEndExcluding" : "9.0.12019.0" ,
"matchCriteriaId" : "BA373E8F-2D94-4EF4-96C4-0306D969EB37"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*" ,
"versionStartIncluding" : "10.0" ,
"versionEndExcluding" : "10.0.12015.0" ,
"matchCriteriaId" : "B3A3E72B-98E3-4754-815F-3B3CE57AC8EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*" ,
"versionEndExcluding" : "17.0.10.0" ,
"matchCriteriaId" : "1B58F4A8-5BF7-4F3E-8267-E5D43D7AA538"
}
]
}
]
2024-02-15 09:01:16 +00:00
}
] ,
"references" : [
{
"url" : "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed" ,
2025-01-23 19:03:50 +00:00
"source" : "security@eset.com" ,
"tags" : [
"Vendor Advisory"
]
2024-11-25 21:08:02 +00:00
} ,
{
"url" : "https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html" ,
2025-01-23 19:03:50 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
2024-11-25 21:08:02 +00:00
} ,
{
"url" : "https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html" ,
2025-01-23 19:03:50 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
2024-11-25 21:08:02 +00:00
} ,
{
"url" : "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed" ,
2025-01-23 19:03:50 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2024-02-15 09:01:16 +00:00
}
]
}