// For flags

CVE-2020-26941

 

Severity Score

5.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower.

Un usuario local (autenticado) con pocos privilegios puede explotar un comportamiento en un instalador de ESET para lograr la sobrescritura (eliminación) arbitraria de cualquier archivo por medio de un enlace simbólico, debido a permisos no seguros. La posibilidad de aprovechar esta vulnerabilidad es limitada y solo puede tener lugar durante la fase de instalación de los productos ESET. Además, la explotación solo puede tener éxito cuando Self-Defense está desactivada. Los productos afectados son: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versiones 13.2 y anteriores; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versiones 7.3 y anteriores; ESET File Security para Microsoft Windows Server, ESET Mail Security para Microsoft Exchange Server, ESET Mail Security para IBM Domino, ESET Security para Kerio

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-10 CVE Reserved
  • 2021-01-21 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-276: Incorrect Default Permissions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Eset
Search vendor "Eset"
Endpoint Antivirus
Search vendor "Eset" for product "Endpoint Antivirus"
<= 7.3
Search vendor "Eset" for product "Endpoint Antivirus" and version " <= 7.3"
-
Affected
Eset
Search vendor "Eset"
Endpoint Security
Search vendor "Eset" for product "Endpoint Security"
<= 7.3
Search vendor "Eset" for product "Endpoint Security" and version " <= 7.3"
-
Affected
Eset
Search vendor "Eset"
File Security
Search vendor "Eset" for product "File Security"
<= 7.2
Search vendor "Eset" for product "File Security" and version " <= 7.2"
windows_server
Affected
Eset
Search vendor "Eset"
Internet Security
Search vendor "Eset" for product "Internet Security"
<= 13.2
Search vendor "Eset" for product "Internet Security" and version " <= 13.2"
-
Affected
Eset
Search vendor "Eset"
Internet Security
Search vendor "Eset" for product "Internet Security"
1294
Search vendor "Eset" for product "Internet Security" and version "1294"
-
Affected
Eset
Search vendor "Eset"
Mail Security
Search vendor "Eset" for product "Mail Security"
<= 7.2
Search vendor "Eset" for product "Mail Security" and version " <= 7.2"
domino
Affected
Eset
Search vendor "Eset"
Mail Security
Search vendor "Eset" for product "Mail Security"
<= 7.2
Search vendor "Eset" for product "Mail Security" and version " <= 7.2"
exchange_server
Affected
Eset
Search vendor "Eset"
Nod32 Antivirus
Search vendor "Eset" for product "Nod32 Antivirus"
<= 7.3
Search vendor "Eset" for product "Nod32 Antivirus" and version " <= 7.3"
business
Affected
Eset
Search vendor "Eset"
Nod32 Antivirus
Search vendor "Eset" for product "Nod32 Antivirus"
<= 13.2
Search vendor "Eset" for product "Nod32 Antivirus" and version " <= 13.2"
-
Affected
Eset
Search vendor "Eset"
Security
Search vendor "Eset" for product "Security"
<= 7.2
Search vendor "Eset" for product "Security" and version " <= 7.2"
kerio
Affected
Eset
Search vendor "Eset"
Security
Search vendor "Eset" for product "Security"
<= 7.2
Search vendor "Eset" for product "Security" and version " <= 7.2"
sharepoint_server
Affected
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
<= 7.3
Search vendor "Eset" for product "Smart Security" and version " <= 7.3"
business
Affected
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
<= 13.2
Search vendor "Eset" for product "Smart Security" and version " <= 13.2"
-
Affected
Eset
Search vendor "Eset"
Smart Security
Search vendor "Eset" for product "Smart Security"
<= 13.2
Search vendor "Eset" for product "Smart Security" and version " <= 13.2"
premium
Affected