CVE-2021-37852

ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:azure:*:*:*
cpe:2.3:a:eset:server_security:8.0.12003.0:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:8.0.12003.1:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:-:windows:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-863 CWE-269

11 Feb 2022, 19:35

Type Values Removed Values Added
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-148/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-148/ - Third Party Advisory, VDB Entry
References (MISC) https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows - (MISC) https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows - Vendor Advisory
CPE cpe:2.3:a:eset:smart_security:*:*:*:*:-:windows:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:azure:*:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:server_security:8.0.12003.1:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:server_security:8.0.12003.0:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*
CWE CWE-863
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 7.8

09 Feb 2022, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-09 06:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-37852

Mitre link : CVE-2021-37852

CVE.ORG link : CVE-2021-37852


JSON object : View

Products Affected

eset

  • smart_security
  • nod32_antivirus
  • endpoint_security
  • endpoint_antivirus
  • server_security
  • file_security
  • mail_security
  • internet_security
  • security
CWE
CWE-269

Improper Privilege Management