Action not permitted
Modal body text goes here.
Modal Title
Modal Body
GHSA-M69P-R3H8-6WPR
Vulnerability from github – Published: 2025-10-31 15:30 – Updated: 2025-10-31 15:30
VLAI?
Details
Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product's configuration.
Severity ?
{
"affected": [],
"aliases": [
"CVE-2025-4952"
],
"database_specific": {
"cwe_ids": [
"CWE-732"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-31T13:15:34Z",
"severity": "MODERATE"
},
"details": "Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product\u0027s configuration.",
"id": "GHSA-m69p-r3h8-6wpr",
"modified": "2025-10-31T15:30:31Z",
"published": "2025-10-31T15:30:31Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4952"
},
{
"type": "WEB",
"url": "https://support.eset.com/en/ca8853-eset-customer-advisory-denial-of-service-vulnerability-in-eset-security-products-for-windows-fixed"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
CVE-2025-4952 (GCVE-0-2025-4952)
Vulnerability from cvelistv5 – Published: 2025-10-31 12:28 – Updated: 2025-10-31 14:18
VLAI?
EPSS
Title
Denial-of-service vulnerability in ESET security products for Windows
Summary
Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product's configuration.
Severity ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ESET | ESET NOD32 Antivirus |
Unaffected:
1496
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-4952",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-31T14:18:06.194469Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T14:18:16.911Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"hips"
],
"platforms": [
"Windows"
],
"product": "ESET NOD32 Antivirus",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Internet Security",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Smart Security Premium",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Security Ultimate",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Small Business Security",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Safe Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Endpoint Antivirus",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Endpoint Security for Windows",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Server Security for Windows Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Mail Security for Microsoft Exchange Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Mail Security for IBM Domino",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Security for Microsoft SharePoint Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET File Security for Microsoft Azure",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_nod32_antivirus:1496:*:windows:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_internet_security:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_smart_security_premium:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_security_ultimate:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_small_business_security:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_safe_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_endpoint_antivirus:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_endpoint_security_for_windows:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_server_security_for_windows_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_mail_security_for_microsoft_exchange_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_mail_security_for_ibm_domino:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_security_for_microsoft_sharepoint_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_file_security_for_microsoft_azure:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"datePublic": "2025-08-22T10:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eTampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product\u0027s configuration.\u003c/span\u003e"
}
],
"value": "Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product\u0027s configuration."
}
],
"impacts": [
{
"capecId": "CAPEC-203",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-203 Manipulate Registry Information"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T12:28:15.267Z",
"orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"shortName": "ESET"
},
"references": [
{
"url": "https://support.eset.com/en/ca8853-eset-customer-advisory-denial-of-service-vulnerability-in-eset-security-products-for-windows-fixed"
}
],
"source": {
"advisory": "ca8853",
"discovery": "UNKNOWN"
},
"title": "Denial-of-service vulnerability in ESET security products for Windows",
"x_generator": {
"engine": "Vulnogram 0.4.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"assignerShortName": "ESET",
"cveId": "CVE-2025-4952",
"datePublished": "2025-10-31T12:28:15.267Z",
"dateReserved": "2025-05-19T10:36:38.958Z",
"dateUpdated": "2025-10-31T14:18:16.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…