Cybersecurity firm ESET on Wednesday announced patches for a high-severity vulnerability in its consumer, business, and server security products for Windows, which could lead to elevation of privilege.
The flaw, tracked as CVE-2024-0353 (CVSS score of 7.8), was identified in the real-time file system protection feature of its products, which handles file operations.
According to the company’s advisory, an attacker with low privileges could exploit this vulnerability to delete arbitrary files with System privileges.
“The vulnerability potentially allowed an attacker to misuse ESET’s file operations, as performed by the real-time file system protection, to delete files without having proper permission,” the company says.
ESET says the security defect was reported by researchers with Trend Micro’s ZDI and that it has no evidence of in-the-wild exploitation.
The flaw impacts ESET’s antivirus, endpoint, and server products for Windows, as well as email security and products for Exchange Server, IBM Domino, SharePoint Server, and Azure.
Patches for the vulnerability were released for NOD32 Antivirus, Internet Security, Smart Security Premium, Security Ultimate, Endpoint Antivirus and Endpoint Security for Windows, Server Security for Windows Server, Mail Security for Exchange Server and IBM Domino, and ESET Security for SharePoint Server.
The company urges File Security for Microsoft Azure customers to migrate to Server Security for Windows Server.
The list does not include ESET products that reached their end-of-life (EoL) status.
ESET customers are advised to apply the available patches as soon as possible. The exploitation of flaws in security products could have devastating results, given the high privileges these applications have.
Related: Flaws in Avast, AVG Antiviruses Could Have Facilitated Attacks on Millions of Devices
Related: ESET Patches High-Severity Vulnerability in Secure Traffic Scanning Feature
Related: ESET Patches High-Severity Vulnerability in Windows Applications