// For flags

CVE-2014-4973

 

Severity Score

6.9
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The ESET Personal Firewall NDIS filter (EpFwNdis.sys) driver in the Firewall Module Build 1183 (20140214) and earlier in ESET Smart Security and ESET Endpoint Security products 5.0 through 7.0 allows local users to gain privileges via a crafted argument to a 0x830020CC IOCTL call.

El controlador del filtro NIDS de ESET Personal Firewall (EpFwNdis.sys) en el módulo del Firewall Build 1183 (20140214) y anteriores en productos ESET Smart Security y ESET Endpoint Security 5.0 hasta 7.0 permite a usuarios locales ganar privilegios a través de un argumento manipulado en una llamada IOCTL 0x830020CC.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-07-15 CVE Reserved
  • 2014-08-20 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
5.0.94
Search vendor "Eset" for product "Smart Security" and version "5.0.94"
-
Affected
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
5.0.95
Search vendor "Eset" for product "Smart Security" and version "5.0.95"
-
Affected
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
5.2.9
Search vendor "Eset" for product "Smart Security" and version "5.2.9"
-
Affected
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
5.2.15
Search vendor "Eset" for product "Smart Security" and version "5.2.15"
-
Affected
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
6.0.306
Search vendor "Eset" for product "Smart Security" and version "6.0.306"
-
Affected
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
6.0.308
Search vendor "Eset" for product "Smart Security" and version "6.0.308"
-
Affected
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
6.0.314
Search vendor "Eset" for product "Smart Security" and version "6.0.314"
-
Affected
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
6.0.316
Search vendor "Eset" for product "Smart Security" and version "6.0.316"
-
Affected
Eset
Search vendor "Eset"
Endpoint Security
Search vendor "Eset" for product "Endpoint Security"
5.0.2113
Search vendor "Eset" for product "Endpoint Security" and version "5.0.2113"
-
Affected
Eset
Search vendor "Eset"
Endpoint Security
Search vendor "Eset" for product "Endpoint Security"
5.0.2122
Search vendor "Eset" for product "Endpoint Security" and version "5.0.2122"
-
Affected
Eset
Search vendor "Eset"
Endpoint Security
Search vendor "Eset" for product "Endpoint Security"
5.0.2126
Search vendor "Eset" for product "Endpoint Security" and version "5.0.2126"
-
Affected
Eset
Search vendor "Eset"
Endpoint Security
Search vendor "Eset" for product "Endpoint Security"
5.0.2214
Search vendor "Eset" for product "Endpoint Security" and version "5.0.2214"
-
Affected
Eset
Search vendor "Eset"
Endpoint Security
Search vendor "Eset" for product "Endpoint Security"
5.0.2225
Search vendor "Eset" for product "Endpoint Security" and version "5.0.2225"
-
Affected
Eset
Search vendor "Eset"
Endpoint Security
Search vendor "Eset" for product "Endpoint Security"
5.0.2228
Search vendor "Eset" for product "Endpoint Security" and version "5.0.2228"
-
Affected