Search criteria
10 vulnerabilities found for Cyber Security by ESET
CERTFR-2024-AVI-0801
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer une élévation de privilèges et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Safe Server | ESET Safe Server sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Small Business Security | ESET Small Business Security sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Security Ultimate | ESET Security Ultimate sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Endpoint Security | ESET Endpoint Security sans le correctif de sécurité Cleaner module 1251 pour Windows | ||
| ESET | File Security | ESET File Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft Azure | ||
| ESET | NOD32 Antivirus | ESET NOD32 Antivirus sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Internet Security | ESET Internet Security sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Mail Security | ESET Mail Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft Exchange Server et IBM Domino | ||
| ESET | Smart Security Premium | ESET Smart Security Premium sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Server Security | ESET Server Security sans le correctif de sécurité Cleaner module 1251 pour Windows Server | ||
| ESET | Endpoint Security | ESET Endpoint Security versions antérieures à 8.0.7200.0 pour macOS | ||
| ESET | Cyber Security | ESET Cyber Security versions antérieures à 7.5.74.0 | ||
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Security | ESET Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft SharePoint Server |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESET Safe Server sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Safe Server",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Small Business Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Small Business Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Security Ultimate sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Security Ultimate",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Windows",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET File Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft Azure",
"product": {
"name": "File Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET NOD32 Antivirus sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "NOD32 Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Internet Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Internet Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Mail Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft Exchange Server et IBM Domino ",
"product": {
"name": "Mail Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Smart Security Premium sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Smart Security Premium",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Server Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Windows Server",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Security versions ant\u00e9rieures \u00e0 8.0.7200.0 pour macOS ",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Cyber Security versions ant\u00e9rieures \u00e0 7.5.74.0 ",
"product": {
"name": "Cyber Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Antivirus sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft SharePoint Server",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-6654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6654"
},
{
"name": "CVE-2024-7400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7400"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0801",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET",
"vendor_advisories": [
{
"published_at": "2024-09-20",
"title": "Bulletin de s\u00e9curit\u00e9 ESET ca8725",
"url": "https://support-feed.eset.com/link/15370/16815452/ca8725"
},
{
"published_at": "2024-09-20",
"title": "Bulletin de s\u00e9curit\u00e9 ESET ca8726",
"url": "https://support-feed.eset.com/link/15370/16815451/ca8726"
}
]
}
CERTFR-2023-AVI-0466
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Cyber Security | ESET Cyber Security versions 7.3.x antérieures à 7.3.3700.0 | ||
| ESET | Server Security | ESET Server Security pour Linux versions 9.1.x antérieures à 9.1.98.0 | ||
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus pour Linux versions antérieures à 8.1.12.0 | ||
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus pour Linux versions antérieures à 9.1.11.0 | ||
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus pour macOS versions 7.x antérieures à 7.3.3600.0 | ||
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus pour Linux versions antérieures à 9.0.10.0 | ||
| ESET | Server Security | ESET Server Security pour Linux versions 9.0.x antérieures à 9.0.466.0 | ||
| ESET | Server Security | ESET Server Security pour Linux versions antérieures à 8.1.823.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESET Cyber Security versions 7.3.x ant\u00e9rieures \u00e0 7.3.3700.0",
"product": {
"name": "Cyber Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Server Security pour Linux versions 9.1.x ant\u00e9rieures \u00e0 9.1.98.0",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Antivirus pour Linux versions ant\u00e9rieures \u00e0 8.1.12.0",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Antivirus pour Linux versions ant\u00e9rieures \u00e0 9.1.11.0",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Antivirus pour macOS versions 7.x ant\u00e9rieures \u00e0 7.3.3600.0",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Antivirus pour Linux versions ant\u00e9rieures \u00e0 9.0.10.0",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Server Security pour Linux versions 9.0.x ant\u00e9rieures \u00e0 9.0.466.0",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Server Security pour Linux versions ant\u00e9rieures \u00e0 8.1.823.0",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-2847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2847"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0466",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-15T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0\nun attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ESET du 14 juin 2023",
"url": "https://support.eset.com/en/ca8447-local-privilege-escalation-vulnerability-in-eset-products-for-linux-and-macos-fixed"
}
]
}
CERTFR-2021-AVI-822
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Cyber Security | ESET Cyber Security et ESET Cyber Security Pro versions antérieures à 6.11.2.0 | ||
| ESET | N/A | ESET Endpoint Antivirus pour macOS et ESET Endpoint Security pour macOS versions antérieures à 6.11.1.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESET Cyber Security et ESET Cyber Security Pro versions ant\u00e9rieures \u00e0 6.11.2.0",
"product": {
"name": "Cyber Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Antivirus pour macOS et ESET Endpoint Security pour macOS versions ant\u00e9rieures \u00e0 6.11.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37850"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-822",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0\nun attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ESET du 20 octobre 2021",
"url": "https://support.eset.com/en/ca8151-denial-of-service-vulnerability-in-eset-products-for-macos-fixed"
}
]
}
CERTFR-2021-AVI-810
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus pour macOS versions antérieures à 6.11.1.0 | ||
| ESET | Cyber Security | ESET Cyber Security Pro versions antérieures à 6.11.2.0 | ||
| ESET | Endpoint Security | ESET Endpoint Security pour macOS versions antérieures à 6.11.1.0 | ||
| ESET | Cyber Security | ESET Cyber Security versions antérieures à 6.11.2.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESET Endpoint Antivirus pour macOS versions ant\u00e9rieures \u00e0 6.11.1.0",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Cyber Security Pro versions ant\u00e9rieures \u00e0 6.11.2.0",
"product": {
"name": "Cyber Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Security pour macOS versions ant\u00e9rieures \u00e0 6.11.1.0",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Cyber Security versions ant\u00e9rieures \u00e0 6.11.2.0",
"product": {
"name": "Cyber Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37850"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-810",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-21T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0\nun attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ESET 2021-0013 du 20 octobre 2021",
"url": "https://support.eset.com/en/ca8151-local-privilege-escalation-vulnerability-in-eset-products-for-macos-fixed"
}
]
}
CVE-2023-2847 (GCVE-0-2023-2847)
Vulnerability from cvelistv5 – Published: 2023-06-15 07:46 – Updated: 2024-12-12 16:38- CWE-269 - Improper Privilege Management
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ESET | Server Security for Linux |
Unaffected:
9.1.98.0
Unaffected: 9.0.466.0 Unaffected: 8.1.823.0 |
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:33:05.820Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://support.eset.com/en/ca8447"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2847",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-12T16:38:10.347865Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-12T16:38:25.361Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Server Security for Linux",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "9.1.98.0"
},
{
"status": "unaffected",
"version": "9.0.466.0"
},
{
"status": "unaffected",
"version": "8.1.823.0"
}
]
},
{
"defaultStatus": "affected",
"product": "Endpoint Antivirus for Linux",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "9.1.11.0"
},
{
"status": "unaffected",
"version": "9.0.10.0"
},
{
"status": "unaffected",
"version": "8.1.12.0"
}
]
},
{
"defaultStatus": "affected",
"product": "Cyber Security",
"vendor": "ESET ",
"versions": [
{
"status": "unaffected",
"version": "7.3.3700.0"
}
]
},
{
"defaultStatus": "affected",
"product": "Endpoint Antivirus for macOS",
"vendor": "ESET ",
"versions": [
{
"status": "unaffected",
"version": "7.3.3600.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cp\u003eDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\u003c/p\u003e\u003cp\u003eESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\u003c/p\u003e\n\n"
}
],
"value": "\nDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\n\nESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\n\n\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-15T07:46:47.134Z",
"orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"shortName": "ESET"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.eset.com/en/ca8447"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Local privilege escalation in ESET products for Linux and MacOS",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"assignerShortName": "ESET",
"cveId": "CVE-2023-2847",
"datePublished": "2023-06-15T07:46:47.134Z",
"dateReserved": "2023-05-23T07:26:04.714Z",
"dateUpdated": "2024-12-12T16:38:25.361Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-2847 (GCVE-0-2023-2847)
Vulnerability from nvd – Published: 2023-06-15 07:46 – Updated: 2024-12-12 16:38- CWE-269 - Improper Privilege Management
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ESET | Server Security for Linux |
Unaffected:
9.1.98.0
Unaffected: 9.0.466.0 Unaffected: 8.1.823.0 |
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:33:05.820Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://support.eset.com/en/ca8447"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2847",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-12T16:38:10.347865Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-12T16:38:25.361Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Server Security for Linux",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "9.1.98.0"
},
{
"status": "unaffected",
"version": "9.0.466.0"
},
{
"status": "unaffected",
"version": "8.1.823.0"
}
]
},
{
"defaultStatus": "affected",
"product": "Endpoint Antivirus for Linux",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "9.1.11.0"
},
{
"status": "unaffected",
"version": "9.0.10.0"
},
{
"status": "unaffected",
"version": "8.1.12.0"
}
]
},
{
"defaultStatus": "affected",
"product": "Cyber Security",
"vendor": "ESET ",
"versions": [
{
"status": "unaffected",
"version": "7.3.3700.0"
}
]
},
{
"defaultStatus": "affected",
"product": "Endpoint Antivirus for macOS",
"vendor": "ESET ",
"versions": [
{
"status": "unaffected",
"version": "7.3.3600.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cp\u003eDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\u003c/p\u003e\u003cp\u003eESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\u003c/p\u003e\n\n"
}
],
"value": "\nDuring internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.\n\nESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.\n\n\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-15T07:46:47.134Z",
"orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"shortName": "ESET"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.eset.com/en/ca8447"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Local privilege escalation in ESET products for Linux and MacOS",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"assignerShortName": "ESET",
"cveId": "CVE-2023-2847",
"datePublished": "2023-06-15T07:46:47.134Z",
"dateReserved": "2023-05-23T07:26:04.714Z",
"dateUpdated": "2024-12-12T16:38:25.361Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}