Lucene search

K
cve[email protected]CVE-2023-3160
HistoryAug 14, 2023 - 10:15 a.m.

CVE-2023-3160

2023-08-1410:15:09
CWE-269
web.nvd.nist.gov
31
cve-2023-3160
eset
vulnerability
file operations
unauthorized access

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.

Affected configurations

NVD
Node
esetendpoint_antivirusMatch--
OR
esetendpoint_securityMatch-
OR
esetinternet_securityMatch-
OR
esetmail_securityMatch-domino
OR
esetmail_securityMatch-exchange_server
OR
esetnod32Match-
OR
esetsecurityMatch-sharepoint_server
OR
esetserver_securityMatch-windows_server
OR
esetsmart_securityMatch-premium

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "HIPS"
    ],
    "product": "ESET NOD32 Antivirus",
    "vendor": "ESET, spol. s r.o.",
    "versions": [
      {
        "status": "unaffected",
        "version": "1463"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "modules": [
      "HIPS"
    ],
    "product": "ESET Internet Security",
    "vendor": "ESET, spol. s r.o.",
    "versions": [
      {
        "status": "unaffected",
        "version": "1463"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "modules": [
      "HIPS"
    ],
    "product": "ESET Smart Security Premium",
    "vendor": "ESET, spol. s r.o.",
    "versions": [
      {
        "status": "unaffected",
        "version": "1463"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "modules": [
      "HIPS"
    ],
    "product": "ESET Endpoint Antivirus",
    "vendor": "ESET, spol. s r.o.",
    "versions": [
      {
        "status": "unaffected",
        "version": "1463"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "modules": [
      "HIPS"
    ],
    "product": "ESET Endpoint Security",
    "vendor": "ESET, spol. s r.o.",
    "versions": [
      {
        "status": "unaffected",
        "version": "1463"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "modules": [
      "HIPS"
    ],
    "product": "ESET Server Security for Windows Server (File Security)",
    "vendor": "ESET, spol. s r.o.",
    "versions": [
      {
        "status": "unaffected",
        "version": "1463"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "modules": [
      "HIPS"
    ],
    "product": "ESET Mail Security for Microsoft Exchange Server",
    "vendor": "ESET, spol. s r.o.",
    "versions": [
      {
        "status": "unaffected",
        "version": "1463"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "modules": [
      "HIPS"
    ],
    "product": "ESET Mail Security for IBM Domino",
    "vendor": "ESET, spol. s r.o.",
    "versions": [
      {
        "status": "unaffected",
        "version": "1463"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "modules": [
      "HIPS"
    ],
    "product": "ESET Security for Microsoft SharePoint Server",
    "vendor": "ESET, spol. s r.o.",
    "versions": [
      {
        "status": "unaffected",
        "version": "1463"
      }
    ]
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

Related for CVE-2023-3160