CVE-2024-0353

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in ESET Windows products where an attacker could misuse file operations to delete files without proper permissions. It affects ESET antivirus/security software users on Windows systems. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • ESET NOD32 Antivirus
  • ESET Internet Security
  • ESET Smart Security
  • ESET Endpoint Security
Versions: Multiple versions up to and including 17.2.7.0 and 18.0.12.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows versions of ESET products. The vulnerability involves unquoted service paths and link following issues.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could delete critical system files, potentially causing system instability, data loss, or facilitating further attacks by removing security controls.

🟠

Likely Case

Local user could delete files they shouldn't have access to, potentially disrupting applications or removing security logs/evidence.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to non-critical files accessible to the user context.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local system access.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this to escalate privileges or delete protected files.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires local access and some technical knowledge. Public exploit code exists on ExploitDB and Packet Storm.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 17.2.7.0 and 18.0.12.0 (check specific product updates)

Vendor Advisory: https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed

Restart Required: Yes

Instructions:

1. Open ESET product. 2. Navigate to Update section. 3. Click 'Check for updates'. 4. Install all available updates. 5. Restart computer when prompted.

🔧 Temporary Workarounds

Restrict local access

windows

Limit local user access to systems running vulnerable ESET versions

Monitor file deletion events

windows

Enable auditing for file deletion events in Windows Event Log

auditpol /set /subcategory:"File System" /success:enable /failure:enable

🧯 If You Can't Patch

  • Implement strict access controls to limit who has local login rights
  • Enable detailed file system auditing and monitor for unauthorized file deletion attempts

🔍 How to Verify

Check if Vulnerable:

Check ESET product version in GUI (Help > About) or run 'eset' command in command prompt

Check Version:

wmic product where "name like 'ESET%'" get name,version

Verify Fix Applied:

Verify ESET version is updated beyond vulnerable versions (17.2.7.0 for v17, 18.0.12.0 for v18)

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file deletion events in Windows Security logs
  • ESET service path manipulation attempts

Network Indicators:

  • Local privilege escalation typically has minimal network indicators

SIEM Query:

EventID=4663 AND ObjectType="File" AND AccessMask="0x10000" (Delete access)

🔗 References

📤 Share & Export