

Furthermore, exploitation can only succeed when Self-Defense is disabled. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop.Ī local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 9.0.ĮSET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot.ĮSET Archive Support Module before 1296 allows virus-detection bypass via a crafted Compression Information Field in a ZIP archive. ESET Mail Security for IBM Domino 6.0 versions prior to 1.0.

ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 0.0. ESET File Security for Microsoft Windows Server 3.0. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 2.0. ESET Endpoint Security 6.0 versions prior to. ESET Endpoint Antivirus 6.0 versions prior to. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0.

Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. Use-after-free in eset_rtp kernel module used in ESET products for Linux allows potential attacker to trigger denial-of-service condition on the system.ĮSET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 9.0.

allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. Privilege escalation vulnerability in Windows products of ESET, spol.
