Vulnerabilities

ESET Patches High-Severity Privilege Escalation Vulnerability

ESET has released patches for a high-severity elevation of privilege vulnerability in its Windows security products.

ESET has released patches for a high-severity elevation of privilege vulnerability in its Windows security products.

Cybersecurity firm ESET on Wednesday announced patches for a high-severity vulnerability in its consumer, business, and server security products for Windows, which could lead to elevation of privilege.

The flaw, tracked as CVE-2024-0353 (CVSS score of 7.8), was identified in the real-time file system protection feature of its products, which handles file operations.

According to the company’s advisory, an attacker with low privileges could exploit this vulnerability to delete arbitrary files with System privileges.

“The vulnerability potentially allowed an attacker to misuse ESET’s file operations, as performed by the real-time file system protection, to delete files without having proper permission,” the company says.

ESET says the security defect was reported by researchers with Trend Micro’s ZDI and that it has no evidence of in-the-wild exploitation.

The flaw impacts ESET’s antivirus, endpoint, and server products for Windows, as well as email security and products for Exchange Server, IBM Domino, SharePoint Server, and Azure.

Patches for the vulnerability were released for NOD32 Antivirus, Internet Security, Smart Security Premium, Security Ultimate, Endpoint Antivirus and Endpoint Security for Windows, Server Security for Windows Server, Mail Security for Exchange Server and IBM Domino, and ESET Security for SharePoint Server.

The company urges File Security for Microsoft Azure customers to migrate to Server Security for Windows Server.

Advertisement. Scroll to continue reading.

The list does not include ESET products that reached their end-of-life (EoL) status.

ESET customers are advised to apply the available patches as soon as possible. The exploitation of flaws in security products could have devastating results, given the high privileges these applications have.

Related: Flaws in Avast, AVG Antiviruses Could Have Facilitated Attacks on Millions of Devices

Related: ESET Patches High-Severity Vulnerability in Secure Traffic Scanning Feature

Related: ESET Patches High-Severity Vulnerability in Windows Applications

Related Content

Vulnerabilities

CISA’s Vulnrichment project is adding important information to CVE records to help improve vulnerability management processes.

Vulnerabilities

F5 has patched two potentially serious vulnerabilities in BIG-IP Next that could allow an attacker to take full control of a device.

Vulnerabilities

CISA and the FBI warn of threat actors abusing path traversal software vulnerabilities in attacks targeting critical infrastructure.

Mobile & Wireless

Microsoft has uncovered a new type of attack called Dirty Stream that impacted Android apps with billions of installations. 

Vulnerabilities

A vulnerability (CVE-2024-27322) in the R programming language implementation can be exploited to execute arbitrary and be used as part of a supply chain...

Vulnerabilities

Cisco patches a high-severity Integrated Management Controller vulnerability for which PoC exploit code is available.

Vulnerabilities

PAM company Delinea over the weekend rushed to patch a critical authentication bypass vulnerability after it apparently ignored the researcher who found the flaw.

Vulnerabilities

Juniper Networks patches dozens of vulnerabilities in Junos OS, Junos OS Evolved, and other products.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version