First published: Wed Apr 29 2020(Updated: )
ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ESET Antivirus and Antispyware | >=1553<=1560 | |
Eset Endpoint Antivirus | ||
Eset Endpoint Security | ||
Eset File Security | ||
ESET Internet Security | ||
Eset Mail Security | ||
Eset Mail Security | ||
Eset Mail Security | ||
Eset Mail Security | ||
Eset Nod32 Antivirus | ||
Eset Nod32 Antivirus | ||
ESET Smart Security | ||
ESET Smart Security | ||
ESET Smart Security |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11446 is a vulnerability that allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be writable by the user, thus achieving privilege escalation.
Versions 1553 through 1560 of ESET Antivirus and Antispyware are affected by CVE-2020-11446.
An attacker with limited access rights can exploit CVE-2020-11446 by creating hard links in ESET directories and then forcing the product to write through these links into files that would normally not be writable by the user.
The severity of CVE-2020-11446 is high, with a CVSS score of 7.8.
To fix CVE-2020-11446, users should update their ESET products for Windows to the latest version as provided by the vendor.