CVE-2024-0353

Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:*
cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*

History

23 Jan 2025, 17:18

Type Values Removed Values Added
First Time Eset
Eset endpoint Security
Eset internet Security
Eset smart Security
Eset mail Security
Eset file Security
Eset nod32 Antivirus
Eset endpoint Antivirus
Eset server Security
Eset security
CPE cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*
cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
References () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed - () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed - Vendor Advisory
References () https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html - () https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html - Broken Link
References () https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html - () https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html - Broken Link
CWE NVD-CWE-noinfo

25 Nov 2024, 19:15

Type Values Removed Values Added
References
  • () https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html -
  • () https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html -

21 Nov 2024, 08:46

Type Values Removed Values Added
References () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed - () https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed -

15 Feb 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-15 08:15

Updated : 2025-01-23 17:18


NVD link : CVE-2024-0353

Mitre link : CVE-2024-0353

CVE.ORG link : CVE-2024-0353


JSON object : View

Products Affected

eset

  • nod32_antivirus
  • smart_security
  • endpoint_antivirus
  • security
  • endpoint_security
  • internet_security
  • server_security
  • file_security
  • mail_security
CWE
CWE-269

Improper Privilege Management

NVD-CWE-noinfo