CVE-2024-0353

Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:*
cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*

History

23 Jan 2025, 17:18

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
First Time Eset internet Security
Eset server Security
Eset file Security
Eset endpoint Security
Eset security
Eset
Eset mail Security
Eset endpoint Antivirus
Eset nod32 Antivirus
Eset smart Security
References () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed - () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed - Vendor Advisory
References () https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html - () https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html - Broken Link
References () https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html - () https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html - Broken Link

25 Nov 2024, 19:15

Type Values Removed Values Added
References
  • () https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html -
  • () https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html -

21 Nov 2024, 08:46

Type Values Removed Values Added
References () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed - () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed -
Summary
  • (es) La vulnerabilidad de escalada de privilegios local potencialmente permitió a un atacante hacer un mal uso de las operaciones de archivos de ESET para eliminar archivos sin tener el permiso adecuado.

15 Feb 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-15 08:15

Updated : 2025-01-23 17:18


NVD link : CVE-2024-0353

Mitre link : CVE-2024-0353

CVE.ORG link : CVE-2024-0353


JSON object : View

Products Affected

eset

  • mail_security
  • internet_security
  • nod32_antivirus
  • security
  • smart_security
  • file_security
  • endpoint_antivirus
  • endpoint_security
  • server_security
CWE
CWE-269

Improper Privilege Management

NVD-CWE-noinfo