CVE-2021-37851 (GCVE-0-2021-37851)

Vulnerability from cvelistv5 – Published: 2022-05-11 14:08 – Updated: 2024-09-16 22:51
VLAI?
Summary
Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:30:08.493Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8268"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Internet Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Smart Security Premium",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "15.1.12.0",
              "status": "affected",
              "version": "11.2",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Antivirus",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "changes": [
                {
                  "at": "8.1.2050.0",
                  "status": "unaffected"
                },
                {
                  "at": "8.0.2053.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "9.0.2046.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Endpoint Security",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "changes": [
                {
                  "at": "8.1.2050.0",
                  "status": "unaffected"
                },
                {
                  "at": "8.0.2053.0",
                  "status": "unaffected"
                }
              ],
              "lessThan": "9.0.2046.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Server Security for Microsoft Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "9.0.12012.0",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET File Security for Microsoft Windows Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "status": "affected",
              "version": "6.0 8.0.12013.0"
            }
          ]
        },
        {
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.10020.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.14011.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET, spol. s r.o.",
          "versions": [
            {
              "lessThan": "8.0.15009.0",
              "status": "affected",
              "version": "6.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-05-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-11T14:08:03",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.eset.com/en/ca8268"
        }
      ],
      "source": {
        "advisory": "ca8268",
        "discovery": "EXTERNAL"
      },
      "title": "Local Privilege Escalation in ESET product for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@eset.com",
          "DATE_PUBLIC": "2022-05-09T13:00:00.000Z",
          "ID": "CVE-2021-37851",
          "STATE": "PUBLIC",
          "TITLE": "Local Privilege Escalation in ESET product for Windows"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ESET NOD32 Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Internet Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Smart Security Premium",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "11.2",
                            "version_value": "15.1.12.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Antivirus",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "9.0.2046.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.1.2050.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.2053.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Endpoint Security",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "9.0.2046.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.1.2050.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.2053.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Server Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "8.0",
                            "version_value": "9.0.12012.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET File Security for Microsoft Windows Server",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "6.0",
                            "version_value": "8.0.12013.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for Microsoft Exchange Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.10020.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Mail Security for IBM Domino",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.14011.0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ESET Security for Microsoft SharePoint Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "6.0",
                            "version_value": "8.0.15009.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ESET, spol. s r.o."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-280 Improper Handling of Insufficient Permissions or Privileges"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.eset.com/en/ca8268",
              "refsource": "MISC",
              "url": "https://support.eset.com/en/ca8268"
            }
          ]
        },
        "source": {
          "advisory": "ca8268",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2021-37851",
    "datePublished": "2022-05-11T14:08:03.466440Z",
    "dateReserved": "2021-08-02T00:00:00",
    "dateUpdated": "2024-09-16T22:51:23.644Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"6.0\", \"versionEndExcluding\": \"8.0.2053.0\", \"matchCriteriaId\": \"B3B4B09F-0A8D-433D-BEB0-95B1F71C4243\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"8.1\", \"versionEndExcluding\": \"8.1.2050.0\", \"matchCriteriaId\": \"C1B57A00-9B42-46B7-AFE1-2DF41E3AD7C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"9.0\", \"versionEndExcluding\": \"9.0.2046.0\", \"matchCriteriaId\": \"9126E224-6F5B-4312-A268-25785D33D332\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"6.0\", \"versionEndExcluding\": \"8.0.2053.0\", \"matchCriteriaId\": \"64320D36-E321-4AC5-B769-03B41FAF37DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"8.1\", \"versionEndExcluding\": \"8.1.2050.0\", \"matchCriteriaId\": \"0839107D-7843-4C27-B91F-33733CD3658D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"9.0\", \"versionEndExcluding\": \"9.0.2046.0\", \"matchCriteriaId\": \"F47550A5-8416-44F4-8104-58FFB9F94EF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*\", \"versionStartIncluding\": \"6.0\", \"versionEndExcluding\": \"8.0.12013.0\", \"matchCriteriaId\": \"0C0E8002-5140-494C-A890-E1D40E398F2C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"11.2\", \"versionEndExcluding\": \"15.1.12.0\", \"matchCriteriaId\": \"90FE16A7-F332-48C0-B42B-612B481CCA50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*\", \"versionStartIncluding\": \"6.0\", \"versionEndExcluding\": \"8.0.10020.0\", \"matchCriteriaId\": \"33D85DF1-A33C-4445-AA40-E6DC181C455B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*\", \"versionStartIncluding\": \"6.0\", \"versionEndExcluding\": \"8.0.14011.0\", \"matchCriteriaId\": \"19005039-6B1F-4622-AA24-4428A8B69360\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"11.2\", \"versionEndExcluding\": \"15.1.12.0\", \"matchCriteriaId\": \"C39C1B8A-80FC-450B-BE04-2908389FC61C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*\", \"versionStartIncluding\": \"6.0\", \"versionEndExcluding\": \"8.0.15009.0\", \"matchCriteriaId\": \"9292F9CA-FD25-4BE1-AAB6-E1DC060EA66A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:server_security:*:*:*:*:*:azure:*:*\", \"versionStartIncluding\": \"6.0\", \"matchCriteriaId\": \"C34234B3-5AC3-4896-9F5F-57DABC8527F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*\", \"versionStartIncluding\": \"8.0\", \"versionEndExcluding\": \"9.0.12012.0\", \"matchCriteriaId\": \"C98987B5-8F3F-4EE1-82EB-80F2620BD3A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*\", \"versionStartIncluding\": \"11.2\", \"versionEndExcluding\": \"15.1.12.0\", \"matchCriteriaId\": \"6E82A43A-0260-4038-8BF6-F39F8E9438B8\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.\"}, {\"lang\": \"es\", \"value\": \"Una escalada local de privilegios en los productos Windows de ESET permite al usuario que ha iniciado sesi\\u00f3n en el sistema explotar la funcionalidad repair del instalador para ejecutar c\\u00f3digo malicioso con privilegios superiores. Este problema afecta: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versiones anteriores a 9.0.2046.0; 6.0 versiones anteriores a 8.1.2050.0; 6.0 versiones anteriores a 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versiones anteriores a 9.0.2046.0; 6.0 versiones anteriores a 8.1.2050.0; 6.0 versiones anteriores a 8.0.2053.0. ESET, spol. s r.o. ESET Server Security para Microsoft Windows Server 8.0 versiones anteriores a 9.0.12012.0. ESET, spol. s r.o. ESET File Security para Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security para Microsoft Exchange Server 6.0 versiones anteriores a 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security para IBM Domino 6.0 versiones anteriores a 8.0.14011.0. ESET, spol. s r.o. ESET Security para Microsoft SharePoint Server 6.0 versiones anteriores a 8.0.15009.0\"}]",
      "id": "CVE-2021-37851",
      "lastModified": "2024-11-21T06:15:58.627",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@eset.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.3, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2022-05-11T15:15:08.487",
      "references": "[{\"url\": \"https://support.eset.com/en/ca8268\", \"source\": \"security@eset.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.eset.com/en/ca8268\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@eset.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security@eset.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-280\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-755\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-37851\",\"sourceIdentifier\":\"security@eset.com\",\"published\":\"2022-05-11T15:15:08.487\",\"lastModified\":\"2024-11-21T06:15:58.627\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.\"},{\"lang\":\"es\",\"value\":\"Una escalada local de privilegios en los productos Windows de ESET permite al usuario que ha iniciado sesi\u00f3n en el sistema explotar la funcionalidad repair del instalador para ejecutar c\u00f3digo malicioso con privilegios superiores. Este problema afecta: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versiones anteriores a 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versiones anteriores a 9.0.2046.0; 6.0 versiones anteriores a 8.1.2050.0; 6.0 versiones anteriores a 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versiones anteriores a 9.0.2046.0; 6.0 versiones anteriores a 8.1.2050.0; 6.0 versiones anteriores a 8.0.2053.0. ESET, spol. s r.o. ESET Server Security para Microsoft Windows Server 8.0 versiones anteriores a 9.0.12012.0. ESET, spol. s r.o. ESET File Security para Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security para Microsoft Exchange Server 6.0 versiones anteriores a 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security para IBM Domino 6.0 versiones anteriores a 8.0.14011.0. ESET, spol. s r.o. ESET Security para Microsoft SharePoint Server 6.0 versiones anteriores a 8.0.15009.0\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@eset.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@eset.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-280\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-755\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndExcluding\":\"8.0.2053.0\",\"matchCriteriaId\":\"B3B4B09F-0A8D-433D-BEB0-95B1F71C4243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"8.1\",\"versionEndExcluding\":\"8.1.2050.0\",\"matchCriteriaId\":\"C1B57A00-9B42-46B7-AFE1-2DF41E3AD7C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"9.0\",\"versionEndExcluding\":\"9.0.2046.0\",\"matchCriteriaId\":\"9126E224-6F5B-4312-A268-25785D33D332\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndExcluding\":\"8.0.2053.0\",\"matchCriteriaId\":\"64320D36-E321-4AC5-B769-03B41FAF37DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"8.1\",\"versionEndExcluding\":\"8.1.2050.0\",\"matchCriteriaId\":\"0839107D-7843-4C27-B91F-33733CD3658D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"9.0\",\"versionEndExcluding\":\"9.0.2046.0\",\"matchCriteriaId\":\"F47550A5-8416-44F4-8104-58FFB9F94EF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndExcluding\":\"8.0.12013.0\",\"matchCriteriaId\":\"0C0E8002-5140-494C-A890-E1D40E398F2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"11.2\",\"versionEndExcluding\":\"15.1.12.0\",\"matchCriteriaId\":\"90FE16A7-F332-48C0-B42B-612B481CCA50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndExcluding\":\"8.0.10020.0\",\"matchCriteriaId\":\"33D85DF1-A33C-4445-AA40-E6DC181C455B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndExcluding\":\"8.0.14011.0\",\"matchCriteriaId\":\"19005039-6B1F-4622-AA24-4428A8B69360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"11.2\",\"versionEndExcluding\":\"15.1.12.0\",\"matchCriteriaId\":\"C39C1B8A-80FC-450B-BE04-2908389FC61C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndExcluding\":\"8.0.15009.0\",\"matchCriteriaId\":\"9292F9CA-FD25-4BE1-AAB6-E1DC060EA66A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:server_security:*:*:*:*:*:azure:*:*\",\"versionStartIncluding\":\"6.0\",\"matchCriteriaId\":\"C34234B3-5AC3-4896-9F5F-57DABC8527F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*\",\"versionStartIncluding\":\"8.0\",\"versionEndExcluding\":\"9.0.12012.0\",\"matchCriteriaId\":\"C98987B5-8F3F-4EE1-82EB-80F2620BD3A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*\",\"versionStartIncluding\":\"11.2\",\"versionEndExcluding\":\"15.1.12.0\",\"matchCriteriaId\":\"6E82A43A-0260-4038-8BF6-F39F8E9438B8\"}]}]}],\"references\":[{\"url\":\"https://support.eset.com/en/ca8268\",\"source\":\"security@eset.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.eset.com/en/ca8268\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…