CVE-2024-2003

7.3 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in ESET security products where an attacker can misuse file operations during quarantine restore to gain elevated privileges. It affects ESET users with vulnerable versions installed. The attacker must have local access to the system to exploit this vulnerability.

💻 Affected Systems

Products:
  • ESET Endpoint Antivirus
  • ESET Endpoint Security
  • ESET Server Security
  • ESET File Security
  • ESET Mail Security
Versions: Versions prior to 11.1.12.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected ESET products on Windows are vulnerable. The vulnerability is in the quarantine restore functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access gains SYSTEM/root privileges, enabling complete system compromise, data theft, malware persistence, and lateral movement.

🟠

Likely Case

Local user or malware with limited privileges escalates to administrative rights, allowing installation of additional malware, disabling security controls, or accessing sensitive data.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to the compromised user account without system-wide compromise.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local system access, not remotely exploitable.
🏢 Internal Only: HIGH - Malicious insiders or compromised user accounts can exploit this to gain full system control within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of the vulnerability. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 11.1.12.0 or later

Vendor Advisory: https://support.eset.com/ca8674

Restart Required: Yes

Instructions:

1. Open ESET product. 2. Navigate to Help and Support > Check for updates. 3. Install available updates. 4. Restart the computer when prompted.

🔧 Temporary Workarounds

Disable quarantine restore for non-admins

windows

Configure ESET to restrict quarantine restore operations to administrators only

Implement least privilege access

all

Ensure users operate with minimal necessary privileges to limit impact if exploited

🧯 If You Can't Patch

  • Implement strict access controls and limit local administrative privileges
  • Monitor for suspicious file operations in ESET quarantine directories

🔍 How to Verify

Check if Vulnerable:

Check ESET product version in the application interface or via 'eset_ver' command in ESET command-line tools

Check Version:

Open ESET GUI > Help and Support > About, or run 'eset_ver' from command line

Verify Fix Applied:

Verify ESET version is 11.1.12.0 or higher and check that quarantine restore operations function normally

📡 Detection & Monitoring

Log Indicators:

  • Unusual quarantine restore operations
  • Multiple failed restore attempts
  • Restore operations from non-admin accounts

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

EventID from ESET logs showing quarantine restore operations from non-privileged accounts

🔗 References

📤 Share & Export