Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-37852 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
NOD32 Other software / Other software solutions ESET Internet Security Client/Desktop applications / Antivirus software/Personal firewalls ESET Smart Security Client/Desktop applications / Antivirus software/Personal firewalls ESET Smart Security Premium Client/Desktop applications / Antivirus software/Personal firewalls ESET Endpoint Antivirus for Windows Client/Desktop applications / Antivirus software/Personal firewalls ESET Endpoint Security for Windows Client/Desktop applications / Antivirus software/Personal firewalls ESET Server Security for Microsoft Windows Server Server applications / Server solutions for antivurus protection ESET File Security for Microsoft Windows Server Server applications / Server solutions for antivurus protection ESET Security for Microsoft SharePoint Server Server applications / Server solutions for antivurus protection ESET Mail Security for IBM Domino Server applications / Server solutions for antivurus protection ESET Mail Security for Microsoft Exchange Server Server applications / Server solutions for antivurus protection |
Vendor | Eset |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU60263
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-37852
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions within the use of named pipes, which leads to security restrictions bypass and privilege escalation.
MitigationInstall updates from vendor's website.
Vulnerable software versionsNOD32: - - 15.0.18.0
ESET Internet Security: - - 15.0.18.0
ESET Smart Security: - - 15.0.18.0
ESET Smart Security Premium: - - 15.0.18.0
ESET Endpoint Antivirus for Windows: - - 9.0.2032.4
ESET Endpoint Security for Windows: - - 9.0.2032.4
ESET Server Security for Microsoft Windows Server: 8.0.12003.0 - 8.0.12003.1
ESET File Security for Microsoft Windows Server: - - 7.3.12006.0
ESET Security for Microsoft SharePoint Server: - - 8.0.15004.0
ESET Mail Security for IBM Domino: - - 8.0.14004.0
ESET Mail Security for Microsoft Exchange Server: - - 8.0.10016.0
CPE2.3https://www.zerodayinitiative.com/advisories/ZDI-22-148/
https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.