#VU86629 Link following in Eset products - CVE-2024-0353
Published: February 20, 2024
Vulnerability identifier: #VU86629
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-0353
CWE-ID: CWE-59
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
ESET NOD32 Antivirus
ESET Internet Security
ESET Smart Security Premium
ESET Security Ultimate
ESET Endpoint Antivirus for Windows
ESET Endpoint Security for Windows
ESET File Security for Microsoft Azure
ESET File Security for Microsoft Windows Server
ESET Mail Security for Microsoft Exchange Server
ESET Mail Security for IBM Domino
ESET Security for Microsoft SharePoint Server
ESET NOD32 Antivirus
ESET Internet Security
ESET Smart Security Premium
ESET Security Ultimate
ESET Endpoint Antivirus for Windows
ESET Endpoint Security for Windows
ESET File Security for Microsoft Azure
ESET File Security for Microsoft Windows Server
ESET Mail Security for Microsoft Exchange Server
ESET Mail Security for IBM Domino
ESET Security for Microsoft SharePoint Server
Software vendor:
Eset
Eset
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a link following issue within the ESET Service. A local user can abuse the service to delete a file, which leads to security restrictions bypass and privilege escalation.
Remediation
Install updates from vendor's website.