Search criteria
3 vulnerabilities by ESET
CVE-2025-4952 (GCVE-0-2025-4952)
Vulnerability from cvelistv5 – Published: 2025-10-31 12:28 – Updated: 2025-10-31 14:18
VLAI?
Title
Denial-of-service vulnerability in ESET security products for Windows
Summary
Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product's configuration.
Severity ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ESET | ESET NOD32 Antivirus |
Unaffected:
1496
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-4952",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-31T14:18:06.194469Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T14:18:16.911Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"hips"
],
"platforms": [
"Windows"
],
"product": "ESET NOD32 Antivirus",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Internet Security",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Smart Security Premium",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Security Ultimate",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Small Business Security",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Safe Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Endpoint Antivirus",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Endpoint Security for Windows",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Server Security for Windows Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Mail Security for Microsoft Exchange Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Mail Security for IBM Domino",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Security for Microsoft SharePoint Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET File Security for Microsoft Azure",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_nod32_antivirus:1496:*:windows:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_internet_security:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_smart_security_premium:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_security_ultimate:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_small_business_security:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_safe_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_endpoint_antivirus:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_endpoint_security_for_windows:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_server_security_for_windows_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_mail_security_for_microsoft_exchange_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_mail_security_for_ibm_domino:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_security_for_microsoft_sharepoint_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_file_security_for_microsoft_azure:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"datePublic": "2025-08-22T10:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eTampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product\u0027s configuration.\u003c/span\u003e"
}
],
"value": "Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product\u0027s configuration."
}
],
"impacts": [
{
"capecId": "CAPEC-203",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-203 Manipulate Registry Information"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T12:28:15.267Z",
"orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"shortName": "ESET"
},
"references": [
{
"url": "https://support.eset.com/en/ca8853-eset-customer-advisory-denial-of-service-vulnerability-in-eset-security-products-for-windows-fixed"
}
],
"source": {
"advisory": "ca8853",
"discovery": "UNKNOWN"
},
"title": "Denial-of-service vulnerability in ESET security products for Windows",
"x_generator": {
"engine": "Vulnogram 0.4.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"assignerShortName": "ESET",
"cveId": "CVE-2025-4952",
"datePublished": "2025-10-31T12:28:15.267Z",
"dateReserved": "2025-05-19T10:36:38.958Z",
"dateUpdated": "2025-10-31T14:18:16.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-2847 (GCVE-0-2023-2847)
Vulnerability from cvelistv5 – Published: 2023-06-15 07:46 – Updated: 2024-12-12 16:38
VLAI?
Title
Local privilege escalation in ESET products for Linux and MacOS
Summary
During internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.
ESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.
Severity ?
7.8 (High)
CWE
- CWE-269 - Improper Privilege Management
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ESET | Server Security for Linux |
Unaffected:
9.1.98.0
Unaffected: 9.0.466.0 Unaffected: 8.1.823.0 |
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:33:05.820Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://support.eset.com/en/ca8447"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2847",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-12T16:38:10.347865Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-12T16:38:25.361Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Server Security for Linux",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "9.1.98.0"
},
{
"status": "unaffected",
"version": "9.0.466.0"
},
{
"status": "unaffected",
"version": "8.1.823.0"
}
]
},
{
"defaultStatus": "affected",
"product": "Endpoint Antivirus for Linux",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "9.1.11.0"
},
{
"status": "unaffected",
"version": "9.0.10.0"
},
{
"status": "unaffected",
"version": "8.1.12.0"
}
]
},
{
"defaultStatus": "affected",
"product": "Cyber Security",
"vendor": "ESET ",
"versions": [
{
"status": "unaffected",
"version": "7.3.3700.0"
}
]
},
{
"defaultStatus": "affected",
"product": "Endpoint Antivirus for macOS",
"vendor": "ESET ",
"versions": [
{
"status": "unaffected",
"version": "7.3.3600.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cp\u003eDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\u003c/p\u003e\u003cp\u003eESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\u003c/p\u003e\n\n"
}
],
"value": "\nDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\n\nESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\n\n\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-15T07:46:47.134Z",
"orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"shortName": "ESET"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.eset.com/en/ca8447"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Local privilege escalation in ESET products for Linux and MacOS",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"assignerShortName": "ESET",
"cveId": "CVE-2023-2847",
"datePublished": "2023-06-15T07:46:47.134Z",
"dateReserved": "2023-05-23T07:26:04.714Z",
"dateUpdated": "2024-12-12T16:38:25.361Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-37852 (GCVE-0-2021-37852)
Vulnerability from cvelistv5 – Published: 2022-02-09 05:14 – Updated: 2024-09-16 23:02
VLAI?
Title
LPE in ESET products for Windows
Summary
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
Severity ?
7.8 (High)
CWE
- Privilege Escalation
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ESET | ESET NOD32 Antivirus |
Affected:
10.0.337.1 , ≤ 15.0.18.0
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T01:30:09.085Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "ESET NOD32 Antivirus",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "15.0.18.0",
"status": "affected",
"version": "10.0.337.1",
"versionType": "custom"
}
]
},
{
"product": "ESET Internet Security",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "15.0.18.0",
"status": "affected",
"version": "10.0.337.1",
"versionType": "custom"
}
]
},
{
"product": "ESET Smart Security",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "15.0.18.0",
"status": "affected",
"version": "10.0.337.1",
"versionType": "custom"
}
]
},
{
"product": "ESET Endpoint Antivirus for Windows",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "9.0.2032.4",
"status": "affected",
"version": "6.6.2046.0",
"versionType": "custom"
}
]
},
{
"product": "ESET Endpoint Security for Windows",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "9.0.2032.4",
"status": "affected",
"version": "6.6.2046.0",
"versionType": "custom"
}
]
},
{
"product": "ESET Server Security for Microsoft Windows Server",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "8.0.12003.1",
"status": "affected",
"version": "8.0.12003.0",
"versionType": "custom"
}
]
},
{
"product": "ESET File Security for Microsoft Windows Server",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "7.3.12006.0",
"status": "affected",
"version": "7.0.12014.0",
"versionType": "custom"
}
]
},
{
"product": "ESET Server Security for Microsoft Azure",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "7.2.12004.1000",
"status": "affected",
"version": "7.0.12016.1002",
"versionType": "custom"
}
]
},
{
"product": "ESET Security for Microsoft SharePoint Server",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "8.0.15004.0",
"status": "affected",
"version": "7.0.15008.0",
"versionType": "custom"
}
]
},
{
"product": "ESET Mail Security for IBM Domino",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "8.0.14004.0",
"status": "affected",
"version": "7.0.14008.0",
"versionType": "custom"
}
]
},
{
"product": "ESET Mail Security for Microsoft Exchange Server",
"vendor": "ESET",
"versions": [
{
"lessThanOrEqual": "8.0.10016.0",
"status": "affected",
"version": "7.0.10019",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative"
}
],
"datePublic": "2022-01-31T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Privilege Escalation",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-09T05:14:13.000Z",
"orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"shortName": "ESET"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/"
}
],
"source": {
"advisory": "CA8223",
"discovery": "EXTERNAL"
},
"title": "LPE in ESET products for Windows",
"workarounds": [
{
"lang": "en",
"value": "The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in ESET products\u00e2\u20ac\u2122 Advanced setup.\n\nHowever, ESET strongly recommends performing an upgrade to a fixed product version and only applying this workaround when the upgrade is not possible for an important reason."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@eset.com",
"DATE_PUBLIC": "2022-01-31T09:00:00.000Z",
"ID": "CVE-2021-37852",
"STATE": "PUBLIC",
"TITLE": "LPE in ESET products for Windows"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ESET NOD32 Antivirus",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "10.0.337.1",
"version_value": "15.0.18.0"
}
]
}
},
{
"product_name": "ESET Internet Security",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "10.0.337.1",
"version_value": "15.0.18.0"
}
]
}
},
{
"product_name": "ESET Smart Security",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "10.0.337.1",
"version_value": "15.0.18.0"
}
]
}
},
{
"product_name": "ESET Endpoint Antivirus for Windows",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "6.6.2046.0",
"version_value": "9.0.2032.4"
}
]
}
},
{
"product_name": "ESET Endpoint Security for Windows",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "6.6.2046.0",
"version_value": "9.0.2032.4"
}
]
}
},
{
"product_name": "ESET Server Security for Microsoft Windows Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "8.0.12003.0",
"version_value": "8.0.12003.1"
}
]
}
},
{
"product_name": "ESET File Security for Microsoft Windows Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "7.0.12014.0",
"version_value": "7.3.12006.0"
}
]
}
},
{
"product_name": "ESET Server Security for Microsoft Azure",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "7.0.12016.1002",
"version_value": "7.2.12004.1000"
}
]
}
},
{
"product_name": "ESET Security for Microsoft SharePoint Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "7.0.15008.0",
"version_value": "8.0.15004.0"
}
]
}
},
{
"product_name": "ESET Mail Security for IBM Domino",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "7.0.14008.0",
"version_value": "8.0.14004.0"
}
]
}
},
{
"product_name": "ESET Mail Security for Microsoft Exchange Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "7.0.10019",
"version_value": "8.0.10016.0"
}
]
}
}
]
},
"vendor_name": "ESET"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\\SYSTEM."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Privilege Escalation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows",
"refsource": "MISC",
"url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-22-148/"
}
]
},
"source": {
"advisory": "CA8223",
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in ESET products\u00e2\u20ac\u2122 Advanced setup.\n\nHowever, ESET strongly recommends performing an upgrade to a fixed product version and only applying this workaround when the upgrade is not possible for an important reason."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"assignerShortName": "ESET",
"cveId": "CVE-2021-37852",
"datePublished": "2022-02-09T05:14:13.627Z",
"dateReserved": "2021-08-02T00:00:00.000Z",
"dateUpdated": "2024-09-16T23:02:00.516Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}