| CVE ID | CVE-2024-0353 |
| CVSS SCORE | 7.8, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
ESET |
| AFFECTED PRODUCTS |
Smart Security Premium |
| VULNERABILITY DETAILS |
This vulnerability allows local attackers to escalate privileges on affected installations of ESET Smart Security Premium. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the ESET Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. |
| ADDITIONAL DETAILS |
ESET has issued an update to correct this vulnerability. More details can be found at:
https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed. |
| DISCLOSURE TIMELINE |
|
| CREDIT | Nicholas Zubrisky and Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative |