The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Endpoint_antivirus | Eset | - (including) | - (including) |
Endpoint_security | Eset | - (including) | - (including) |
Internet_security | Eset | - (including) | - (including) |
Mail_security | Eset | - (including) | - (including) |
Nod32 | Eset | - (including) | - (including) |
Security | Eset | - (including) | - (including) |
Server_security | Eset | - (including) | - (including) |
Smart_security | Eset | - (including) | - (including) |