CVE-2024-3779 (GCVE-0-2024-3779)

Vulnerability from cvelistv5 – Published: 2024-07-16 08:17 – Updated: 2024-08-01 20:20
VLAI?
Title
Denial of Service in ESET products for Windows
Summary
Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-3779",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-16T13:10:29.360811Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-16T13:10:35.421Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:20:01.654Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.eset.com/en/ca8688"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ESET NOD32 Antivirus",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Internet Security",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Smart Security Premium",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Security Ultimate",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "17.1.13.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Endpoint Antivirus for Windows",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.2044.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Endpoint Security for Windows",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.2044.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Server Security for Windows Server",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.12011.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Mail Security for Microsoft Exchange Server",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.10005.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Mail Security for IBM Domino",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESET Security for Microsoft SharePoint Server",
          "vendor": "ESET s.r.o",
          "versions": [
            {
              "lessThanOrEqual": "11.0.15002.0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2024-07-12T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met."
            }
          ],
          "value": "Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-578",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-578 Disable Security Software"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-16T08:17:59.962Z",
        "orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
        "shortName": "ESET"
      },
      "references": [
        {
          "url": "https://support.eset.com/en/ca8688"
        }
      ],
      "source": {
        "advisory": "ca8688",
        "discovery": "UNKNOWN"
      },
      "title": "Denial of Service in ESET products for Windows",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
    "assignerShortName": "ESET",
    "cveId": "CVE-2024-3779",
    "datePublished": "2024-07-16T08:17:59.962Z",
    "dateReserved": "2024-04-15T07:03:57.841Z",
    "dateUpdated": "2024-08-01T20:20:01.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"17.2.7.0\", \"matchCriteriaId\": \"B883CA27-1FC9-4AF6-9BBD-6FC41DE3A667\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:nod32:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"17.2.7.0\", \"matchCriteriaId\": \"620325BE-DDE6-4ADE-BB6A-36CA8E48A30A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*\", \"versionEndExcluding\": \"17.2.7.0\", \"matchCriteriaId\": \"0EB1BEC6-15AD-4B95-A954-814594AE8FCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*\", \"versionEndExcluding\": \"17.2.7.0\", \"matchCriteriaId\": \"B5D76653-60CC-4107-A027-02E2A1B255DE\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*\", \"versionEndExcluding\": \"11.1.2039.0\", \"matchCriteriaId\": \"102DE882-64EA-4752-9722-2EAE0074BF91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*\", \"versionEndExcluding\": \"11.1.2039.0\", \"matchCriteriaId\": \"56305C95-A7D6-49BC-8CEE-5EA343190842\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*\", \"versionEndExcluding\": \"11.0.12012.0\", \"matchCriteriaId\": \"9F9E6C2C-AA89-4377-B0A0-6B3B36209B90\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*\", \"versionEndIncluding\": \"11.0.10008.0\", \"matchCriteriaId\": \"A8906CBA-D3F0-4BC1-B32A-11D4425EE784\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*\", \"matchCriteriaId\": \"5043B5B1-38B2-4621-B738-A79E5DF8D98E\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*\", \"versionEndExcluding\": \"11.0.15004.0\", \"matchCriteriaId\": \"61BC0A21-A589-48B5-9D35-E0E8749EDFDB\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\\u2019s security product inoperable, provided non-default preconditions were met.\"}, {\"lang\": \"es\", \"value\": \"La vulnerabilidad de denegaci\\u00f3n de servicio presente poco despu\\u00e9s de la instalaci\\u00f3n o actualizaci\\u00f3n del producto, potencialmente permiti\\u00f3 que un atacante dejara inoperable el producto de seguridad de ESET, siempre que se cumplieran condiciones previas no predeterminadas.\"}]",
      "id": "CVE-2024-3779",
      "lastModified": "2024-11-21T09:30:22.927",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@eset.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 4.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
      "published": "2024-07-16T09:15:02.877",
      "references": "[{\"url\": \"https://support.eset.com/en/ca8688\", \"source\": \"security@eset.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.eset.com/en/ca8688\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@eset.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security@eset.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-276\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-276\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-3779\",\"sourceIdentifier\":\"security@eset.com\",\"published\":\"2024-07-16T09:15:02.877\",\"lastModified\":\"2024-11-21T09:30:22.927\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\u2019s security product inoperable, provided non-default preconditions were met.\"},{\"lang\":\"es\",\"value\":\"La vulnerabilidad de denegaci\u00f3n de servicio presente poco despu\u00e9s de la instalaci\u00f3n o actualizaci\u00f3n del producto, potencialmente permiti\u00f3 que un atacante dejara inoperable el producto de seguridad de ESET, siempre que se cumplieran condiciones previas no predeterminadas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@eset.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@eset.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"17.2.7.0\",\"matchCriteriaId\":\"B883CA27-1FC9-4AF6-9BBD-6FC41DE3A667\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:nod32:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"17.2.7.0\",\"matchCriteriaId\":\"620325BE-DDE6-4ADE-BB6A-36CA8E48A30A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:*\",\"versionEndExcluding\":\"17.2.7.0\",\"matchCriteriaId\":\"0EB1BEC6-15AD-4B95-A954-814594AE8FCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:*\",\"versionEndExcluding\":\"17.2.7.0\",\"matchCriteriaId\":\"B5D76653-60CC-4107-A027-02E2A1B255DE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*\",\"versionEndExcluding\":\"11.1.2039.0\",\"matchCriteriaId\":\"102DE882-64EA-4752-9722-2EAE0074BF91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*\",\"versionEndExcluding\":\"11.1.2039.0\",\"matchCriteriaId\":\"56305C95-A7D6-49BC-8CEE-5EA343190842\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*\",\"versionEndExcluding\":\"11.0.12012.0\",\"matchCriteriaId\":\"9F9E6C2C-AA89-4377-B0A0-6B3B36209B90\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*\",\"versionEndIncluding\":\"11.0.10008.0\",\"matchCriteriaId\":\"A8906CBA-D3F0-4BC1-B32A-11D4425EE784\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:mail_security:-:*:*:*:*:domino:*:*\",\"matchCriteriaId\":\"5043B5B1-38B2-4621-B738-A79E5DF8D98E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*\",\"versionEndExcluding\":\"11.0.15004.0\",\"matchCriteriaId\":\"61BC0A21-A589-48B5-9D35-E0E8749EDFDB\"}]}]}],\"references\":[{\"url\":\"https://support.eset.com/en/ca8688\",\"source\":\"security@eset.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.eset.com/en/ca8688\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.eset.com/en/ca8688\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T20:20:01.654Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-3779\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-16T13:10:29.360811Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-16T13:10:32.947Z\"}}], \"cna\": {\"title\": \"Denial of Service in ESET products for Windows\", \"source\": {\"advisory\": \"ca8688\", \"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-578\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-578 Disable Security Software\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"ESET s.r.o\", \"product\": \"ESET NOD32 Antivirus\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"17.1.13.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ESET s.r.o\", \"product\": \"ESET Internet Security\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"17.1.13.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ESET s.r.o\", \"product\": \"ESET Smart Security Premium\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"17.1.13.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ESET s.r.o\", \"product\": \"ESET Security Ultimate\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"17.1.13.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ESET s.r.o\", \"product\": \"ESET Endpoint Antivirus for Windows\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"11.0.2044.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ESET s.r.o\", \"product\": \"ESET Endpoint Security for Windows\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"11.0.2044.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ESET s.r.o\", \"product\": \"ESET Server Security for Windows Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"11.0.12011.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ESET s.r.o\", \"product\": \"ESET Mail Security for Microsoft Exchange Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"11.0.10005.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ESET s.r.o\", \"product\": \"ESET Mail Security for IBM Domino\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ESET s.r.o\", \"product\": \"ESET Security for Microsoft SharePoint Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"11.0.15002.0\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2024-07-12T10:00:00.000Z\", \"references\": [{\"url\": \"https://support.eset.com/en/ca8688\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\\u2019s security product inoperable, provided non-default preconditions were met.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET\\u2019s security product inoperable, provided non-default preconditions were met.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-276\", \"description\": \"CWE-276 Incorrect Default Permissions\"}]}], \"providerMetadata\": {\"orgId\": \"4a9b9929-2450-4021-b7b9-469a0255b215\", \"shortName\": \"ESET\", \"dateUpdated\": \"2024-07-16T08:17:59.962Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-3779\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T20:20:01.654Z\", \"dateReserved\": \"2024-04-15T07:03:57.841Z\", \"assignerOrgId\": \"4a9b9929-2450-4021-b7b9-469a0255b215\", \"datePublished\": \"2024-07-16T08:17:59.962Z\", \"assignerShortName\": \"ESET\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…