CVE ID | CVE-2024-0353 |
CVSS SCORE | 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
AFFECTED VENDORS |
ESET |
AFFECTED PRODUCTS |
Smart Security Premium |
VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of ESET Smart Security Premium. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the ESET Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. |
ADDITIONAL DETAILS |
ESET has issued an update to correct this vulnerability. More details can be found at:
https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed. |
DISCLOSURE TIMELINE |
|
CREDIT | Nicholas Zubrisky and Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative |