CVE-2025-13818

6.7 MEDIUM

📋 TL;DR

This vulnerability allows local attackers to escalate privileges by exploiting insecure temporary batch file execution in ESET Management Agent. Attackers can execute arbitrary code with SYSTEM privileges by manipulating batch files created during agent operations. Organizations using ESET Management Agent for Windows are affected.

💻 Affected Systems

Products:
  • ESET Management Agent for Windows
Versions: Versions prior to 10.1.1286.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects ESET Management Agent installations on Windows systems. ESET Endpoint products themselves are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM, allowing attackers to disable security controls, install backdoors, or access sensitive system resources.

🟢

If Mitigated

Limited impact if proper endpoint security controls and least privilege principles are enforced, though SYSTEM access would still be possible.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the system.
🏢 Internal Only: HIGH - Attackers with initial access to a workstation can escalate to SYSTEM privileges and potentially move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system and knowledge of the vulnerable batch file creation process. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.1286.0

Vendor Advisory: https://support.eset.com/en/ca8913-eset-customer-advisory-local-privilege-escalation-via-insecure-temporary-batch-file-execution-in-eset-management-agent-for-windows-fixed

Restart Required: Yes

Instructions:

1. Update ESET Management Agent to version 10.1.1286.0 or later through ESET PROTECT console. 2. Alternatively, download the latest agent installer from ESET website. 3. Deploy the update to all affected systems. 4. Restart systems after installation.

🔧 Temporary Workarounds

Restrict batch file execution

windows

Use Group Policy or AppLocker to restrict batch file execution from temporary directories

AppLocker policy: Deny execution of *.bat, *.cmd from %TEMP% and %TMP% directories

Remove vulnerable agent

windows

Uninstall ESET Management Agent if not required

msiexec /x {ESET Management Agent Product Code} /qn

🧯 If You Can't Patch

  • Implement strict least privilege principles to limit standard user capabilities
  • Monitor for suspicious batch file creation and execution in temporary directories

🔍 How to Verify

Check if Vulnerable:

Check ESET Management Agent version: Open ESET Management Agent tray icon → About, or check registry: HKEY_LOCAL_MACHINE\SOFTWARE\ESET\ESET Security\CurrentVersion\Info\ProductVersion

Check Version:

reg query "HKLM\SOFTWARE\ESET\ESET Security\CurrentVersion\Info" /v ProductVersion

Verify Fix Applied:

Verify version is 10.1.1286.0 or higher using the same methods above

📡 Detection & Monitoring

Log Indicators:

  • Unusual batch file creation in temporary directories by ESET processes
  • Process execution from temporary directories with SYSTEM privileges

Network Indicators:

  • Unusual outbound connections from systems after local privilege escalation

SIEM Query:

Process Creation where (Image contains '.bat' OR Image contains '.cmd') AND (ProcessCommandLine contains '%TEMP%' OR ProcessCommandLine contains '%TMP%') AND ParentImage contains 'ESET'

🔗 References

📤 Share & Export