CVE-2020-26941
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower.
Un usuario local (autenticado) con pocos privilegios puede explotar un comportamiento en un instalador de ESET para lograr la sobrescritura (eliminación) arbitraria de cualquier archivo por medio de un enlace simbólico, debido a permisos no seguros. La posibilidad de aprovechar esta vulnerabilidad es limitada y solo puede tener lugar durante la fase de instalación de los productos ESET. Además, la explotación solo puede tener éxito cuando Self-Defense está desactivada. Los productos afectados son: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versiones 13.2 y anteriores; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versiones 7.3 y anteriores; ESET File Security para Microsoft Windows Server, ESET Mail Security para Microsoft Exchange Server, ESET Mail Security para IBM Domino, ESET Security para Kerio
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-10-10 CVE Reserved
- 2021-01-21 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-276: Incorrect Default Permissions
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Eset Search vendor "Eset" | Endpoint Antivirus Search vendor "Eset" for product "Endpoint Antivirus" | <= 7.3 Search vendor "Eset" for product "Endpoint Antivirus" and version " <= 7.3" | - |
Affected
| ||||||
Eset Search vendor "Eset" | Endpoint Security Search vendor "Eset" for product "Endpoint Security" | <= 7.3 Search vendor "Eset" for product "Endpoint Security" and version " <= 7.3" | - |
Affected
| ||||||
Eset Search vendor "Eset" | File Security Search vendor "Eset" for product "File Security" | <= 7.2 Search vendor "Eset" for product "File Security" and version " <= 7.2" | windows_server |
Affected
| ||||||
Eset Search vendor "Eset" | Internet Security Search vendor "Eset" for product "Internet Security" | <= 13.2 Search vendor "Eset" for product "Internet Security" and version " <= 13.2" | - |
Affected
| ||||||
Eset Search vendor "Eset" | Internet Security Search vendor "Eset" for product "Internet Security" | 1294 Search vendor "Eset" for product "Internet Security" and version "1294" | - |
Affected
| ||||||
Eset Search vendor "Eset" | Mail Security Search vendor "Eset" for product "Mail Security" | <= 7.2 Search vendor "Eset" for product "Mail Security" and version " <= 7.2" | domino |
Affected
| ||||||
Eset Search vendor "Eset" | Mail Security Search vendor "Eset" for product "Mail Security" | <= 7.2 Search vendor "Eset" for product "Mail Security" and version " <= 7.2" | exchange_server |
Affected
| ||||||
Eset Search vendor "Eset" | Nod32 Antivirus Search vendor "Eset" for product "Nod32 Antivirus" | <= 7.3 Search vendor "Eset" for product "Nod32 Antivirus" and version " <= 7.3" | business |
Affected
| ||||||
Eset Search vendor "Eset" | Nod32 Antivirus Search vendor "Eset" for product "Nod32 Antivirus" | <= 13.2 Search vendor "Eset" for product "Nod32 Antivirus" and version " <= 13.2" | - |
Affected
| ||||||
Eset Search vendor "Eset" | Security Search vendor "Eset" for product "Security" | <= 7.2 Search vendor "Eset" for product "Security" and version " <= 7.2" | kerio |
Affected
| ||||||
Eset Search vendor "Eset" | Security Search vendor "Eset" for product "Security" | <= 7.2 Search vendor "Eset" for product "Security" and version " <= 7.2" | sharepoint_server |
Affected
| ||||||
Eset Search vendor "Eset" | Smart Security Search vendor "Eset" for product "Smart Security" | <= 7.3 Search vendor "Eset" for product "Smart Security" and version " <= 7.3" | business |
Affected
| ||||||
Eset Search vendor "Eset" | Smart Security Search vendor "Eset" for product "Smart Security" | <= 13.2 Search vendor "Eset" for product "Smart Security" and version " <= 13.2" | - |
Affected
| ||||||
Eset Search vendor "Eset" | Smart Security Search vendor "Eset" for product "Smart Security" | <= 13.2 Search vendor "Eset" for product "Smart Security" and version " <= 13.2" | premium |
Affected
|