CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-2003

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00024/1

CVE-2024-2003: Local privilege escalation in ESET products. This vulnerability allows a local attacker to gain elevated privileges by exploiting file operations during a quarantine restore process. The CVE-2024-2003 vulnerability in ESET software could be exploited by a malicious local user to escalate their privileges on the system. While the CVSS score is 0, indicating no direct network impact, the SOCRadar Vulnerability Risk Score (SVRS) of 30 suggests a moderate level of risk, especially considering the In The Wild tag. Successful exploitation would grant an attacker higher access levels than intended. This is significant because it compromises the integrity of the system and could lead to further malicious activities. System administrators should ensure that ESET software is updated to the latest version to mitigate this privilege escalation vulnerability.

In The Wild
2024-06-21

2024-06-21

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 3
Michael DePlante and Nicholas Zubrisky2024-11-01
Breaking Barriers and Assumptions: Techniques for Privilege Escalation on Windows: Part 3 | To wrap up this blog series we wanted to include one more technique that you can use when exploiting this class of vulnerabilities. This technique, introduced to us by Abdelhamid Naceri, becomes useful when you have an on-boot arbitrary delete primitive that you want to transform into an on-demand delete, so that you can escalate using the C:\Config.msi technique
zerodayinitiative.com
rss
forum
news
ZDI-24-898: ESET Smart Security Premium Link Following Local Privilege Escalation Vulnerability
2024-06-22
ZDI-24-898: ESET Smart Security Premium Link Following Local Privilege Escalation Vulnerability | This vulnerability allows local attackers to escalate privileges on affected installations of ESET Smart Security Premium. User interaction on the part of an administrator is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2024-2003.
cve-2024-2003
cves
security
privilege escalation
ESET Security Products for Windows Vulnerable to Privilege Escalation
Dhivya2024-06-24
ESET Security Products for Windows Vulnerable to Privilege Escalation | ESET, a leading cybersecurity company, recently addressed a local privilege escalation vulnerability in its Windows security products. The Zero Day Initiative (ZDI) reported the vulnerability to ESET. It could have allowed attackers to misuse ESET&#8217;s file operations during a restore operation from quarantine, potentially leading to an Arbitrary File Creation Local Privilege Escalation. CVE-2024-2003 &#8211; [&#8230;] The post ESET Security Products for Windows Vulnerable to Privilege Escalation</a
cve-2024-2003
domains
urls
cves
CVE-2024-2003 | ESET NOD32 Antivirus prior 1610 privileges management
vuldb.com2024-06-21
CVE-2024-2003 | ESET NOD32 Antivirus prior 1610 privileges management | A vulnerability, which was classified as critical, has been found in ESET NOD32 Antivirus, Internet Security, Smart Security Premium, Security Ultimate, Small Business Security, Safe Server, Endpoint Antivirus for Windows, Endpoint Security for Windows, Server Security for Windows Server, Mail Security for Microsoft Exchange Server, Mail Security for IBM Domino, Security for Microsoft SharePoint Server and File Security for Microsoft Azure. Affected by this issue is some unknown functionality. The
cve-2024-2003
domains
urls
cves

Social Media

ESET Issues Security Patch for Privilege Escalation Flaw in Windows Products https://t.co/yo8UDFhe8y ESET, a leading cybersecurity provider, has addressed a high-severity vulnerability in its range of Windows security products. The flaw, designated CVE-2024-2003 (CVSS 7.3) and…
0
0
0
ESET has addressed a high-severity vulnerability in its range of Windows security products. The flaw, designated CVE-2024-2003 (CVSS 7.3) and discovered by the Zero Day Initiative (ZDI), could have allowed attackers to escalate privileges https://t.co/uDd1lurgcx
0
0
0
🚨 High-severity alert: CVE-2024-2003 affects ESET! A local privilege escalation vulnerability can let attackers exploit file operations during restore from quarantine. Patch now! 🔐 Details: https://t.co/Q04fN39ZAU
0
0
0
CVE-2024-2003 Local privilege escalation vulnerability allowed an attacker to misuse ESET's file operations during a restore operation from quarantine. https://t.co/prhES4LBGN
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://support.eset.com/ca8674

CWE Details

CWE IDCWE NameDescription
CWE-269Improper Privilege ManagementThe software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence