First published: Wed Apr 29 2020(Updated: )
ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ESET Antivirus and Antispyware | >=1553<=1560 | |
ESET Endpoint Antivirus for Linux | ||
ESET Endpoint Security Windows | ||
ESET File Security for Windows Server | ||
ESET Internet Security | ||
ESET Mail Security for IBM Domino | ||
ESET Mail Security for Microsoft Exchange Server | ||
ESET Mail Security for Kerio | ||
ESET Mail Security for Microsoft SharePoint Server | ||
ESET NOD32 Antivirus | ||
ESET NOD32 Antivirus | ||
ESET Smart Security for Windows | ||
ESET Smart Security for Windows | ||
ESET Smart Security for Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11446 is a vulnerability that allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be writable by the user, thus achieving privilege escalation.
Versions 1553 through 1560 of ESET Antivirus and Antispyware are affected by CVE-2020-11446.
An attacker with limited access rights can exploit CVE-2020-11446 by creating hard links in ESET directories and then forcing the product to write through these links into files that would normally not be writable by the user.
The severity of CVE-2020-11446 is high, with a CVSS score of 7.8.
To fix CVE-2020-11446, users should update their ESET products for Windows to the latest version as provided by the vendor.