CVE-2025-13176

N/A Unknown

📋 TL;DR

This vulnerability allows local attackers to plant a custom configuration file in ESET Inspect Connector for Windows, which can then load a malicious DLL. This enables local privilege escalation, potentially granting SYSTEM-level access. Only users with local access to affected Windows systems running vulnerable ESET Inspect Connector versions are impacted.

💻 Affected Systems

Products:
  • ESET Inspect Connector for Windows
Versions: Versions prior to 2.0.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the Windows system where ESET Inspect Connector is installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains SYSTEM privileges on the Windows host, enabling complete system compromise, data theft, persistence establishment, and lateral movement capabilities.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM/administrator privileges, allowing installation of malware, disabling security controls, and accessing sensitive data.

🟢

If Mitigated

Limited impact if proper access controls prevent unauthorized local file writes and DLL loading is restricted via application control policies.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Malicious insiders or attackers who gain initial foothold can exploit this to escalate privileges and compromise the entire system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write files to specific locations. The vulnerability leverages DLL hijacking through custom configuration files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.0.0.0

Vendor Advisory: https://support.eset.com/en/ca8910-eset-customer-advisory-local-privilege-escalation-vulnerability-fixed-in-eset-inspect-connector-for-windows

Restart Required: Yes

Instructions:

1. Download ESET Inspect Connector version 2.0.0.0 or later from ESET's official website. 2. Run the installer to upgrade the existing installation. 3. Restart the system to ensure all components are properly loaded with the fixed version.

🔧 Temporary Workarounds

Restrict file permissions

windows

Apply strict file system permissions to prevent unauthorized users from writing configuration files to ESET Inspect Connector directories.

icacls "C:\Program Files\ESET\ESET Inspect Connector\" /deny Users:(OI)(CI)W

Enable application control

windows

Use Windows Defender Application Control or similar solutions to restrict DLL loading from untrusted locations.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges and prevent unauthorized file writes
  • Monitor for suspicious file creation/modification in ESET Inspect Connector directories and DLL loading events

🔍 How to Verify

Check if Vulnerable:

Check the installed version of ESET Inspect Connector via Control Panel > Programs and Features or by examining the program directory properties.

Check Version:

wmic product where "name like 'ESET Inspect Connector%'" get version

Verify Fix Applied:

Verify that ESET Inspect Connector version is 2.0.0.0 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • File creation/modification events in ESET Inspect Connector directories by non-privileged users
  • DLL loading from unusual locations by ESET Inspect Connector process
  • Privilege escalation events following file modifications

Network Indicators:

  • Unusual outbound connections from ESET Inspect Connector process after potential exploitation

SIEM Query:

EventID=4663 OR EventID=4656 AND ObjectName LIKE '%ESET Inspect Connector%' AND SubjectUserName NOT IN ('SYSTEM', 'Administrators')

🔗 References

📤 Share & Export