Search criteria
15 vulnerabilities found for Endpoint Security by ESET
CERTFR-2025-AVI-0727
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer un déni de service à distance et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Server Security | Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) sans le dernier correctif de sécurité | ||
| ESET | Mail Security | Mail Security pour Microsoft Exchange Server sans le dernier correctif de sécurité | ||
| ESET | File Security | File Security pour Microsoft Azure sans le dernier correctif de sécurité | ||
| ESET | PROTECT On-Prem | PROTECT On-Prem versions 12.1.x antérieures à 12.1.11.0 | ||
| ESET | Security Ultimate | Security Ultimate sans le dernier correctif de sécurité | ||
| ESET | Endpoint Antivirus | Endpoint Antivirus pour Windows sans le dernier correctif de sécurité | ||
| ESET | Endpoint Security | Endpoint Security pour Windows sans le dernier correctif de sécurité | ||
| ESET | Security | Security pour Microsoft SharePoint Server sans le dernier correctif de sécurité | ||
| ESET | Safe Server | Safe Server sans le dernier correctif de sécurité | ||
| ESET | Small Business Security | Small Business Security sans le dernier correctif de sécurité | ||
| ESET | PROTECT On-Prem | PROTECT On-Prem versions 11.1.x antérieures à 11.1.18.0 | ||
| ESET | Smart Security Premium | Smart Security Premium sans le dernier correctif de sécurité | ||
| ESET | NOD32 Antivirus | NOD32 Antivirus sans le dernier correctif de sécurité | ||
| ESET | PROTECT On-Prem | PROTECT On-Prem versions 12.0.x antérieures à 12.0.15.0 | ||
| ESET | Mail Security | Mail Security pour IBM Domino sans le dernier correctif de sécurité | ||
| ESET | Internet Security | Internet Security sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Mail Security pour Microsoft Exchange Server sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Mail Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "File Security pour Microsoft Azure sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "File Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "PROTECT On-Prem versions 12.1.x ant\u00e9rieures \u00e0 12.1.11.0",
"product": {
"name": "PROTECT On-Prem",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Security Ultimate sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Security Ultimate",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Endpoint Antivirus pour Windows sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Endpoint Security pour Windows sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Security pour Microsoft SharePoint Server sans le dernier correctif de s\u00e9curit\u00e9\n\n",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Safe Server sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Safe Server",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Small Business Security sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Small Business Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "PROTECT On-Prem versions 11.1.x ant\u00e9rieures \u00e0 11.1.18.0",
"product": {
"name": "PROTECT On-Prem",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Smart Security Premium sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Smart Security Premium",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "NOD32 Antivirus sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "NOD32 Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "PROTECT On-Prem versions 12.0.x ant\u00e9rieures \u00e0 12.0.15.0",
"product": {
"name": "PROTECT On-Prem",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Mail Security pour IBM Domino sans le dernier correctif de s\u00e9curit\u00e9\n",
"product": {
"name": "Mail Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Internet Security sans le dernier correctif de s\u00e9curit\u00e9\n",
"product": {
"name": "Internet Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8352"
},
{
"name": "CVE-2025-4952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4952"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0727",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET",
"vendor_advisories": [
{
"published_at": "2025-08-21",
"title": "Bulletin de s\u00e9curit\u00e9 ESET ca8854",
"url": "https://support-feed.eset.com/link/15370/17124579/ca8854"
},
{
"published_at": "2025-08-21",
"title": "Bulletin de s\u00e9curit\u00e9 ESET ca8853",
"url": "https://support-feed.eset.com/link/15370/17124580/ca8853"
}
]
}
CERTFR-2025-AVI-0623
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer une élévation de privilèges et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Endpoint Security | Endpoint Security versions antérieures à 11.1.2062.0 pour Windows | ||
| ESET | Small Business Security | Small Business Security versions antérieures à 18.2.14.0 | ||
| ESET | Security | Security versions 11.x antérieures à 11.1.15005.0 pour Microsoft SharePoint Server | ||
| ESET | Mail Security | Mail Security versions 11.x antérieures à 11.1.10013 pour Microsoft Exchange Server | ||
| ESET | Internet Security | Internet Security versions antérieures à 18.2.14.0 | ||
| ESET | Server Security | Server Security versions 12.x antérieures à 12.0.12005.0 pour Windows | ||
| ESET | Smart Security Premium | Smart Security Premium versions antérieures à 18.2.14.0 | ||
| ESET | Security | Security versions 12.x antérieures à 12.0.15005.0 pour Microsoft SharePoint Server | ||
| ESET | Safe Server | Safe Server versions antérieures à 18.2.14.0 | ||
| ESET | Security Ultimate | Security Ultimate versions antérieures à 18.2.14.0 | ||
| ESET | Server Security | Server Security versions 11.x antérieures à 11.1.12013.0 pour Windows | ||
| ESET | Mail Security | Mail Security versions 12.x antérieures à 12.0.10004.0 pour Microsoft Exchange Server | ||
| ESET | Endpoint Antivirus | Endpoint Antivirus versions antérieures à 12.0.2058.0 pour Windows | ||
| ESET | NOD32 Antivirus | NOD32 Antivirus versions antérieures à 18.2.14.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2062.0 pour Windows",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Small Business Security versions ant\u00e9rieures \u00e0 18.2.14.0",
"product": {
"name": "Small Business Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Security versions 11.x ant\u00e9rieures \u00e0 11.1.15005.0 pour Microsoft SharePoint Server",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Mail Security versions 11.x ant\u00e9rieures \u00e0 11.1.10013 pour Microsoft Exchange Server",
"product": {
"name": "Mail Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Internet Security versions ant\u00e9rieures \u00e0 18.2.14.0",
"product": {
"name": "Internet Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Server Security versions 12.x ant\u00e9rieures \u00e0 12.0.12005.0 pour Windows",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Smart Security Premium versions ant\u00e9rieures \u00e0 18.2.14.0",
"product": {
"name": "Smart Security Premium",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Security versions 12.x ant\u00e9rieures \u00e0 12.0.15005.0 pour Microsoft SharePoint Server",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Safe Server versions ant\u00e9rieures \u00e0 18.2.14.0",
"product": {
"name": "Safe Server",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Security Ultimate versions ant\u00e9rieures \u00e0 18.2.14.0",
"product": {
"name": "Security Ultimate",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Server Security versions 11.x ant\u00e9rieures \u00e0 11.1.12013.0 pour Windows",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Mail Security versions 12.x ant\u00e9rieures \u00e0 12.0.10004.0 pour Microsoft Exchange Server",
"product": {
"name": "Mail Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 12.0.2058.0 pour Windows",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "NOD32 Antivirus versions ant\u00e9rieures \u00e0 18.2.14.0",
"product": {
"name": "NOD32 Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-5028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5028"
},
{
"name": "CVE-2025-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2425"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0623",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET",
"vendor_advisories": [
{
"published_at": "2025-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 ESET ca8840",
"url": "https://support-feed.eset.com/link/15370/17103529/ca8840"
},
{
"published_at": "2025-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 ESET ca8838",
"url": "https://support-feed.eset.com/link/15370/17103530/ca8838"
}
]
}
CERTFR-2025-AVI-0280
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Smart Security Premium | Smart Security Premium versions antériéures à 18.1.10.0 | ||
| ESET | Server Security | Server Security versions antérieures à 11.1.12009.0 pour Windows Server | ||
| ESET | NOD32 Antivirus | NOD32 Antivirus versions antériéures à 18.1.10.0 | ||
| ESET | Internet Security | Internet Security versions antériéures à 18.1.10.0 | ||
| ESET | Endpoint Security | Endpoint Security versions antérieures à 12.0.2045.0 | ||
| ESET | Endpoint Antivirus | Endpoint Antivirus versions antérieures à 12.0.2045.0 | ||
| ESET | Mail Security | Mail Security versions antérieures à 11.1.10011.0, 11.0.10010.0 et 10.1.10017.0 pour Microsoft Exchange Server | ||
| ESET | Security Ultimate | Security Ultimate versions antériéures à 18.1.10.0 | ||
| ESET | Endpoint Antivirus | Endpoint Antivirus versions antérieures à 11.1.2059.0 | ||
| ESET | Security | Security versions antérieures à 11.1.15003.0, 11.0.15007.0, 10.0.15008.0 pour Microsoft SharePoint Server | ||
| ESET | Safe Server | ESET Safe Server versions antérieures à 18.1.10.0 | ||
| ESET | Endpoint Security | Endpoint Security versions antérieures à 11.1.2059.0 | ||
| ESET | Small Business Security | Small Business Security versions antérieures à 18.1.10.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Smart Security Premium versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
"product": {
"name": "Smart Security Premium",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Server Security versions ant\u00e9rieures \u00e0 11.1.12009.0 pour Windows Server",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "NOD32 Antivirus versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
"product": {
"name": "NOD32 Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Internet Security versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
"product": {
"name": "Internet Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Endpoint Security versions ant\u00e9rieures \u00e0 12.0.2045.0",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 12.0.2045.0",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Mail Security versions ant\u00e9rieures \u00e0 11.1.10011.0, 11.0.10010.0 et 10.1.10017.0 pour Microsoft Exchange Server",
"product": {
"name": "Mail Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Security Ultimate versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0",
"product": {
"name": "Security Ultimate",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 11.1.2059.0",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Security versions ant\u00e9rieures \u00e0 11.1.15003.0, 11.0.15007.0, 10.0.15008.0 pour Microsoft SharePoint Server",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Safe Server versions ant\u00e9rieures \u00e0 18.1.10.0",
"product": {
"name": "Safe Server",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2059.0",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "Small Business Security versions ant\u00e9rieures \u00e0 18.1.10.0",
"product": {
"name": "Small Business Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-11859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11859"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0280",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
"vendor_advisories": [
{
"published_at": "2025-04-04",
"title": "Bulletin de s\u00e9curit\u00e9 ESET CA8810",
"url": "https://support-feed.eset.com/link/15370/16999046/ca8810"
}
]
}
CERTFR-2024-AVI-0801
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer une élévation de privilèges et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Safe Server | ESET Safe Server sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Small Business Security | ESET Small Business Security sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Security Ultimate | ESET Security Ultimate sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Endpoint Security | ESET Endpoint Security sans le correctif de sécurité Cleaner module 1251 pour Windows | ||
| ESET | File Security | ESET File Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft Azure | ||
| ESET | NOD32 Antivirus | ESET NOD32 Antivirus sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Internet Security | ESET Internet Security sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Mail Security | ESET Mail Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft Exchange Server et IBM Domino | ||
| ESET | Smart Security Premium | ESET Smart Security Premium sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Server Security | ESET Server Security sans le correctif de sécurité Cleaner module 1251 pour Windows Server | ||
| ESET | Endpoint Security | ESET Endpoint Security versions antérieures à 8.0.7200.0 pour macOS | ||
| ESET | Cyber Security | ESET Cyber Security versions antérieures à 7.5.74.0 | ||
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus sans le correctif de sécurité Cleaner module 1251 | ||
| ESET | Security | ESET Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft SharePoint Server |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESET Safe Server sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Safe Server",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Small Business Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Small Business Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Security Ultimate sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Security Ultimate",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Windows",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET File Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft Azure",
"product": {
"name": "File Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET NOD32 Antivirus sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "NOD32 Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Internet Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Internet Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Mail Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft Exchange Server et IBM Domino ",
"product": {
"name": "Mail Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Smart Security Premium sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Smart Security Premium",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Server Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Windows Server",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Security versions ant\u00e9rieures \u00e0 8.0.7200.0 pour macOS ",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Cyber Security versions ant\u00e9rieures \u00e0 7.5.74.0 ",
"product": {
"name": "Cyber Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Antivirus sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft SharePoint Server",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-6654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6654"
},
{
"name": "CVE-2024-7400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7400"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0801",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET",
"vendor_advisories": [
{
"published_at": "2024-09-20",
"title": "Bulletin de s\u00e9curit\u00e9 ESET ca8725",
"url": "https://support-feed.eset.com/link/15370/16815452/ca8725"
},
{
"published_at": "2024-09-20",
"title": "Bulletin de s\u00e9curit\u00e9 ESET ca8726",
"url": "https://support-feed.eset.com/link/15370/16815451/ca8726"
}
]
}
CERTFR-2024-AVI-0581
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une atteinte à l'intégrité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Smart Security Premium | ESET Smart Security Premium versions antérieures à 17.2.7.0 | ||
| ESET | Mail Security | ESET Mail Security versions antérieures à 11.0.10008.0 pour Microsoft Exchange Server | ||
| ESET | Security | ESET Security versions antérieures à 11.0.15004.0 pour Microsoft SharePoint Server | ||
| ESET | Server Security | ESET Server Security versions antérieures à 11.0.12012.0 pour Windows Server | ||
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus versions antérieures à 11.1.2039.0 pour Windows | ||
| ESET | Security Ultimate | ESET Security Ultimate versions antérieures à 17.2.7.0 | ||
| ESET | Internet Security | ESET Internet Security versions antérieures à 17.2.7.0 | ||
| ESET | Endpoint Security | ESET Endpoint Security versions antérieures à 11.1.2039.0 pour Windows | ||
| ESET | NOD32 Antivirus | ESET NOD32 Antivirus versions antérieures à 17.2.7.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESET Smart Security Premium versions ant\u00e9rieures \u00e0 17.2.7.0",
"product": {
"name": "Smart Security Premium",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Mail Security versions ant\u00e9rieures \u00e0 11.0.10008.0 pour Microsoft Exchange Server",
"product": {
"name": "Mail Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Security versions ant\u00e9rieures \u00e0 11.0.15004.0 pour Microsoft SharePoint Server",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Server Security versions ant\u00e9rieures \u00e0 11.0.12012.0 pour Windows Server",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Antivirus versions ant\u00e9rieures \u00e0 11.1.2039.0 pour Windows",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Security Ultimate versions ant\u00e9rieures \u00e0 17.2.7.0",
"product": {
"name": "Security Ultimate",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": " ESET Internet Security versions ant\u00e9rieures \u00e0 17.2.7.0",
"product": {
"name": "Internet Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2039.0 pour Windows",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET NOD32 Antivirus versions ant\u00e9rieures \u00e0 17.2.7.0",
"product": {
"name": "NOD32 Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3779"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0581",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
"vendor_advisories": [
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 ESET ca8688",
"url": "https://support-feed.eset.com/link/15370/16741922/ca8688"
}
]
}
CERTFR-2023-AVI-1053
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Security Ultimate | ESET Security Ultimate | ||
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus versions postérieures à 10.0 pour Linux | ||
| ESET | Server Security | ESET Server Security versions postérieures à 10.1 pour Linux | ||
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus pour Windows | ||
| ESET | NOD32 Antivirus | ESET NOD32 Antivirus | ||
| ESET | Endpoint Security | ESET Endpoint Security pour Windows | ||
| ESET | Smart Security Premium | ESET Smart Security Premium | ||
| ESET | Mail Security | ESET Mail Security pour Microsoft Exchange Server | ||
| ESET | Internet Security | ESET Internet Security | ||
| ESET | Server Security | ESET Server Security pour Windows Server | ||
| ESET | Mail Security | ESET Mail Security pour IBM Domino | ||
| ESET | Security | ESET Security pour Microsoft SharePoint Server | ||
| ESET | File Security | ESET File Security pour Microsoft Azure |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESET Security Ultimate",
"product": {
"name": "Security Ultimate",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Antivirus versions post\u00e9rieures \u00e0 10.0 pour Linux",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Server Security versions post\u00e9rieures \u00e0 10.1 pour Linux",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Antivirus pour Windows",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET NOD32 Antivirus",
"product": {
"name": "NOD32 Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Security pour Windows",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Smart Security Premium",
"product": {
"name": "Smart Security Premium",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Mail Security pour Microsoft Exchange Server",
"product": {
"name": "Mail Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Internet Security",
"product": {
"name": "Internet Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Server Security pour Windows Server",
"product": {
"name": "Server Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Mail Security pour IBM Domino",
"product": {
"name": "Mail Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Security pour Microsoft SharePoint Server",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET File Security pour Microsoft Azure",
"product": {
"name": "File Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-5594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5594"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 ESET\u00a0CA8562 du 20 d\u00e9cembre 2023",
"url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed"
}
],
"reference": "CERTFR-2023-AVI-1053",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-12-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits ESET\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ESET CA8562 du 20 d\u00e9cembre 2023",
"url": null
}
]
}
CERTFR-2021-AVI-810
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| ESET | Endpoint Antivirus | ESET Endpoint Antivirus pour macOS versions antérieures à 6.11.1.0 | ||
| ESET | Cyber Security | ESET Cyber Security Pro versions antérieures à 6.11.2.0 | ||
| ESET | Endpoint Security | ESET Endpoint Security pour macOS versions antérieures à 6.11.1.0 | ||
| ESET | Cyber Security | ESET Cyber Security versions antérieures à 6.11.2.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESET Endpoint Antivirus pour macOS versions ant\u00e9rieures \u00e0 6.11.1.0",
"product": {
"name": "Endpoint Antivirus",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Cyber Security Pro versions ant\u00e9rieures \u00e0 6.11.2.0",
"product": {
"name": "Cyber Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Endpoint Security pour macOS versions ant\u00e9rieures \u00e0 6.11.1.0",
"product": {
"name": "Endpoint Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "ESET Cyber Security versions ant\u00e9rieures \u00e0 6.11.2.0",
"product": {
"name": "Cyber Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37850"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-810",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-21T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0\nun attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 ESET 2021-0013 du 20 octobre 2021",
"url": "https://support.eset.com/en/ca8151-local-privilege-escalation-vulnerability-in-eset-products-for-macos-fixed"
}
]
}
VAR-201411-0062
Vulnerability from variot - Updated: 2023-12-18 13:29The ESET Personal Firewall NDIS filter (EpFwNdis.sys) kernel mode driver, aka Personal Firewall module before Build 1212 (20140609), as used in multiple ESET products 5.0 through 7.0, allows local users to obtain sensitive information from kernel memory via crafted IOCTL calls. Multiple ESET Products are prone to a local information-disclosure vulnerability. Local attackers can exploit this issue to obtain sensitive information. Information obtained may lead to further attacks. Both ESET Smart Security and ESET Endpoint Security are security package solutions from ESET in Slovakia, which include functions such as virus defense and cleaning, anti-spam and firewall; the former is the home version, and the latter is the business version. The vulnerability is caused by improper validation for some IOCTLs.
Further details at:
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4974/
Copyright: Copyright (c) Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
Disclaimer: The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
This email originates from the systems of Portcullis
Computer Security Limited, a Private limited company,
registered in England in accordance with the Companies
Act under number 02763799. The registered office
address of Portcullis Computer Security Limited is:
Portcullis House, 2 Century Court, Tolpits Lane, Watford,
United Kingdom, WD18 9RS.
The information in this email is confidential and may be
legally privileged. It is intended solely for the addressee.
Any opinions expressed are those of the individual and
do not represent the opinion of the organisation. Access
to this email by persons other than the intended recipient
is strictly prohibited.
If you are not the intended recipient, any disclosure,
copying, distribution or other action taken or omitted to be
taken in reliance on it, is prohibited and may be unlawful.
When addressed to our clients any opinions or advice
contained in this email is subject to the terms and
conditions expressed in the applicable Portcullis Computer
Security Limited terms of business.
This e-mail message has been scanned for Viruses and Content and cleared by MailMarshal.
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201411-0062",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "personal firewall ndis filter",
"scope": "lte",
"trust": 1.0,
"vendor": "eset",
"version": "1183_\\(20140214\\)"
},
{
"model": "personal firewall ndis filter",
"scope": "lt",
"trust": 0.8,
"vendor": "eset",
"version": "build 1212 (20140609)"
},
{
"model": "personal firewall ndis filter",
"scope": "eq",
"trust": 0.6,
"vendor": "eset",
"version": "1183_\\(20140214\\)"
},
{
"model": "smart security",
"scope": "eq",
"trust": 0.3,
"vendor": "eset",
"version": "0"
},
{
"model": "personal firewall module build",
"scope": "eq",
"trust": 0.3,
"vendor": "eset",
"version": "1183(20140214"
},
{
"model": "endpoint security",
"scope": "eq",
"trust": 0.3,
"vendor": "eset",
"version": "0"
},
{
"model": "personal firewall module build",
"scope": "ne",
"trust": 0.3,
"vendor": "eset",
"version": "1212(20140609"
}
],
"sources": [
{
"db": "BID",
"id": "70770"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005235"
},
{
"db": "NVD",
"id": "CVE-2014-4974"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-1369"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:eset:personal_firewall_ndis_filter:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1183_\\(20140214\\)",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-4974"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kyriakos Economou",
"sources": [
{
"db": "BID",
"id": "70770"
},
{
"db": "PACKETSTORM",
"id": "128874"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-1369"
}
],
"trust": 1.0
},
"cve": "CVE-2014-4974",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 2.1,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2014-4974",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Low",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-72915",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-4974",
"trust": 1.8,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201410-1369",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-72915",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72915"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005235"
},
{
"db": "NVD",
"id": "CVE-2014-4974"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-1369"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The ESET Personal Firewall NDIS filter (EpFwNdis.sys) kernel mode driver, aka Personal Firewall module before Build 1212 (20140609), as used in multiple ESET products 5.0 through 7.0, allows local users to obtain sensitive information from kernel memory via crafted IOCTL calls. Multiple ESET Products are prone to a local information-disclosure vulnerability. \nLocal attackers can exploit this issue to obtain sensitive information. Information obtained may lead to further attacks. Both ESET Smart Security and ESET Endpoint Security are security package solutions from ESET in Slovakia, which include functions such as virus defense and cleaning, anti-spam and firewall; the former is the home version, and the latter is the business version. \nThe vulnerability is caused by improper validation for some IOCTLs. \n\nFurther details at:\n\nhttps://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4974/\n\nCopyright:\nCopyright (c) Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited. \n\nDisclaimer:\nThe information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user\u0027s risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information. \n\n\n\n###############################################################\nThis email originates from the systems of Portcullis\nComputer Security Limited, a Private limited company, \nregistered in England in accordance with the Companies \nAct under number 02763799. The registered office \naddress of Portcullis Computer Security Limited is: \nPortcullis House, 2 Century Court, Tolpits Lane, Watford, \nUnited Kingdom, WD18 9RS. \nThe information in this email is confidential and may be \nlegally privileged. It is intended solely for the addressee. \nAny opinions expressed are those of the individual and \ndo not represent the opinion of the organisation. Access \nto this email by persons other than the intended recipient \nis strictly prohibited. \nIf you are not the intended recipient, any disclosure, \ncopying, distribution or other action taken or omitted to be \ntaken in reliance on it, is prohibited and may be unlawful. \nWhen addressed to our clients any opinions or advice \ncontained in this email is subject to the terms and \nconditions expressed in the applicable Portcullis Computer \nSecurity Limited terms of business. \n###############################################################\n\n#####################################################################################\nThis e-mail message has been scanned for Viruses and Content and cleared \nby MailMarshal. \n#####################################################################################\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-4974"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005235"
},
{
"db": "BID",
"id": "70770"
},
{
"db": "VULHUB",
"id": "VHN-72915"
},
{
"db": "PACKETSTORM",
"id": "128874"
}
],
"trust": 2.07
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-72915",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72915"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-4974",
"trust": 2.9
},
{
"db": "BID",
"id": "70770",
"trust": 2.0
},
{
"db": "PACKETSTORM",
"id": "128874",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005235",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201410-1369",
"trust": 0.7
},
{
"db": "XF",
"id": "98312",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-72915",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72915"
},
{
"db": "BID",
"id": "70770"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005235"
},
{
"db": "PACKETSTORM",
"id": "128874"
},
{
"db": "NVD",
"id": "CVE-2014-4974"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-1369"
}
]
},
"id": "VAR-201411-0062",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-72915"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:29:39.589000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.eset.com/us/"
},
{
"title": "Windows\u7528\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u30d1\u30fc\u30bd\u30ca\u30eb\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u6a5f\u80fd\u306b\u95a2\u3059\u308b\u8106\u5f31\u6027\uff08JVNDB-2014-005235\uff09\u3078\u306e\u5bfe\u5fdc\u72b6\u6cc1\u306b\u3064\u3044\u3066",
"trust": 0.8,
"url": "http://canon-its.jp/supp/eset/notify20141118.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-005235"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72915"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005235"
},
{
"db": "NVD",
"id": "CVE-2014-4974"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.9,
"url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-4974/"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/70770"
},
{
"trust": 1.7,
"url": "http://seclists.org/fulldisclosure/2014/oct/118"
},
{
"trust": 1.7,
"url": "http://packetstormsecurity.com/files/128874/eset-7.0-kernel-memory-leak.html"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98312"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4974"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-4974"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/98312"
},
{
"trust": 0.3,
"url": "http://www.eset.com/smartsecurity/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-4974"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-72915"
},
{
"db": "BID",
"id": "70770"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005235"
},
{
"db": "PACKETSTORM",
"id": "128874"
},
{
"db": "NVD",
"id": "CVE-2014-4974"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-1369"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-72915"
},
{
"db": "BID",
"id": "70770"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-005235"
},
{
"db": "PACKETSTORM",
"id": "128874"
},
{
"db": "NVD",
"id": "CVE-2014-4974"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-1369"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-11-04T00:00:00",
"db": "VULHUB",
"id": "VHN-72915"
},
{
"date": "2014-10-22T00:00:00",
"db": "BID",
"id": "70770"
},
{
"date": "2014-11-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-005235"
},
{
"date": "2014-10-28T18:13:16",
"db": "PACKETSTORM",
"id": "128874"
},
{
"date": "2014-11-04T16:55:06.450000",
"db": "NVD",
"id": "CVE-2014-4974"
},
{
"date": "2014-10-29T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201410-1369"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-72915"
},
{
"date": "2014-10-22T00:00:00",
"db": "BID",
"id": "70770"
},
{
"date": "2014-12-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-005235"
},
{
"date": "2017-08-29T01:35:10.453000",
"db": "NVD",
"id": "CVE-2014-4974"
},
{
"date": "2014-12-01T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201410-1369"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "70770"
},
{
"db": "CNNVD",
"id": "CNNVD-201410-1369"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural ESET Used in products ESET Personal Firewall NDIS Vulnerability in the acquisition of important information in the filter kernel mode driver",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-005235"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201410-1369"
}
],
"trust": 0.6
}
}