Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-27167

Summary
Assigner-ESET
Assigner Org ID-4a9b9929-2450-4021-b7b9-469a0255b215
Published At-10 May, 2022 | 19:43
Updated At-16 Sep, 2024 | 21:56
Rejected At-
Credits

Arbitrary File Deletion in ESET products for Windows

Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:ESET
Assigner Org ID:4a9b9929-2450-4021-b7b9-469a0255b215
Published At:10 May, 2022 | 19:43
Updated At:16 Sep, 2024 | 21:56
Rejected At:
▼CVE Numbering Authority (CNA)
Arbitrary File Deletion in ESET products for Windows

Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.

Affected Products
Vendor
ESET, spol. s r. o.ESET, spol. s r.o.
Product
ESET NOD32 Antivirus
Versions
Affected
  • From 11.2 before 15.1.12.0 (custom)
Vendor
ESET, spol. s r. o.ESET, spol. s r.o.
Product
ESET Internet Security
Versions
Affected
  • From 11.2 before 15.1.12.0 (custom)
Vendor
ESET, spol. s r. o.ESET, spol. s r.o.
Product
ESET Smart Security Premium
Versions
Affected
  • From 11.2 before 15.1.12.0 (custom)
Vendor
ESET, spol. s r. o.ESET, spol. s r.o.
Product
ESET Endpoint Antivirus
Versions
Affected
  • From 6.0 before 9.0.2046.0 (custom)
    • -> unaffectedfrom8.1.2050.0
    • -> unaffectedfrom8.0.2053.0
Vendor
ESET, spol. s r. o.ESET, spol. s r.o.
Product
ESET Endpoint Security
Versions
Affected
  • From 6.0 before 9.0.2046.0 (custom)
    • -> unaffectedfrom8.1.2050.0
    • -> unaffectedfrom8.0.2053.0
Vendor
ESET, spol. s r. o.ESET, spol. s r.o.
Product
ESET Server Security for Microsoft Windows Server
Versions
Affected
  • From 8.0 before 9.0.12012.0 (custom)
Vendor
ESET, spol. s r. o.ESET, spol. s r.o.
Product
ESET File Security for Microsoft Windows Server
Versions
Affected
  • 6.0 8.0.12013.0
Vendor
ESET, spol. s r. o.ESET, spol. s r.o.
Product
ESET Mail Security for Microsoft Exchange Server
Versions
Affected
  • From 6.0 before 8.0.10020.0 (custom)
Vendor
ESET, spol. s r. o.ESET, spol. s r.o.
Product
ESET Mail Security for IBM Domino
Versions
Affected
  • From 6.0 before 8.0.14011.0 (custom)
Vendor
ESET, spol. s r. o.ESET, spol. s r.o.
Product
ESET Security for Microsoft SharePoint Server
Versions
Affected
  • From 6.0 before 8.0.15009.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-280CWE-280 Improper Handling of Insufficient Permissions or Privileges
Type: CWE
CWE ID: CWE-280
Description: CWE-280 Improper Handling of Insufficient Permissions or Privileges
Metrics
VersionBase scoreBase severityVector
3.17.1HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.eset.com/en/ca8268
x_refsource_MISC
Hyperlink: https://support.eset.com/en/ca8268
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.eset.com/en/ca8268
x_refsource_MISC
x_transferred
Hyperlink: https://support.eset.com/en/ca8268
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@eset.com
Published At:10 May, 2022 | 20:15
Updated At:18 May, 2022 | 16:35

Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.1HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Secondary3.17.1HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Primary2.03.6LOW
AV:L/AC:L/Au:N/C:N/I:P/A:P
Type: Primary
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Type: Primary
Version: 2.0
Base score: 3.6
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:P
CPE Matches

ESET, spol. s r. o.
eset
>>endpoint_antivirus>>Versions from 6.0(inclusive) to 8.0.2053.0(exclusive)
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
ESET, spol. s r. o.
eset
>>endpoint_antivirus>>Versions from 8.1(inclusive) to 8.1.2050.0(exclusive)
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
ESET, spol. s r. o.
eset
>>endpoint_antivirus>>Versions from 9.0(inclusive) to 9.0.2046.0(exclusive)
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
ESET, spol. s r. o.
eset
>>endpoint_security>>Versions from 6.0(inclusive) to 8.0.2053.0(exclusive)
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
ESET, spol. s r. o.
eset
>>endpoint_security>>Versions from 8.1(inclusive) to 8.1.2050.0(exclusive)
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
ESET, spol. s r. o.
eset
>>endpoint_security>>Versions from 9.0(inclusive) to 9.0.2046.0(exclusive)
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
ESET, spol. s r. o.
eset
>>file_security>>Versions from 6.0(inclusive) to 8.0.12013.0(exclusive)
cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*
ESET, spol. s r. o.
eset
>>internet_security>>Versions from 11.2(inclusive) to 15.1.12.0(exclusive)
cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*
ESET, spol. s r. o.
eset
>>mail_security>>Versions from 6.0(inclusive) to 8.0.10020.0(exclusive)
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
ESET, spol. s r. o.
eset
>>mail_security>>Versions from 6.0(inclusive) to 8.0.14011.0(exclusive)
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
ESET, spol. s r. o.
eset
>>nod32_antivirus>>Versions from 11.2(inclusive) to 15.1.12.0(exclusive)
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*
ESET, spol. s r. o.
eset
>>security>>Versions from 6.0(inclusive) to 8.0.15009.0(exclusive)
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:*
ESET, spol. s r. o.
eset
>>server_security>>Versions from 6.0(inclusive)
cpe:2.3:a:eset:server_security:*:*:*:*:*:azure:*:*
ESET, spol. s r. o.
eset
>>server_security>>Versions from 8.0(inclusive) to 9.0.12012.0(exclusive)
cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:*
ESET, spol. s r. o.
eset
>>smart_security>>Versions from 11.2(inclusive) to 15.1.12.0(exclusive)
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*
Weaknesses
CWE IDTypeSource
CWE-755Primarynvd@nist.gov
CWE-280Secondarysecurity@eset.com
CWE ID: CWE-755
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-280
Type: Secondary
Source: security@eset.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.eset.com/en/ca8268security@eset.com
Vendor Advisory
Hyperlink: https://support.eset.com/en/ca8268
Source: security@eset.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found