Product:

Endpoint_antivirus

(Eset)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 14
Date Id Summary Products Score Patch Annotated
2021-01-26 CVE-2020-26941 A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET... Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Smart_security 5.5
2021-11-08 CVE-2021-37850 ESET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot. Cyber_security, Endpoint_antivirus, Endpoint_security 5.5
2022-02-09 CVE-2021-37852 ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM. Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security 7.8
2022-02-25 CVE-2022-0615 Use-after-free in eset_rtp kernel module used in ESET products for Linux allows potential attacker to trigger denial-of-service condition on the system. Endpoint_antivirus, Server_security 7.5
2022-05-10 CVE-2022-27167 Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to... Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security 7.1
2022-05-11 CVE-2021-37851 Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions... Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security 7.8
2023-06-15 CVE-2023-2847 During internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges. ESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability. Cyber_security, Endpoint_antivirus, Server_security 7.8
2023-08-14 CVE-2023-3160 The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions. Endpoint_antivirus, Endpoint_security, Internet_security, Mail_security, Nod32, Security, Server_security, Smart_security 7.8
2023-12-21 CVE-2023-5594 Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted. Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security 8.6
2024-01-31 CVE-2023-7043 Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions. Endpoint_antivirus, Endpoint_security, Internet_security, Mail_security, Nod32_antivirus, Smart_security_premium 5.5