First published: Wed Jan 31 2024(Updated: )
Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions.
Credit: security@eset.com
Affected Software | Affected Version | How to fix |
---|---|---|
ESET Endpoint Antivirus for Linux | >=10.1.2046.0<11.0.2032.0 | |
ESET Endpoint Security Windows | >=10.1.2046.0<11.0.2032.0 | |
ESET Internet Security | >=16.1.14.0<17.0.15.0 | |
ESET Mail Security for Microsoft Exchange Server | =10.1.10012.0 | |
ESET NOD32 Antivirus | >=16.1.14.0<17.0.15.0 | |
ESET Smart Security Premium | >=16.1.14.0<17.0.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7043 is considered a medium severity vulnerability due to the risk of unauthorized program execution with elevated permissions.
To fix CVE-2023-7043, ensure that you update your ESET software to a version that addresses this unquoted service path vulnerability.
CVE-2023-7043 affects various versions of ESET Endpoint Antivirus, Endpoint Security, Internet Security, Mail Security for Microsoft Exchange Server, NOD32 Antivirus, and Smart Security Premium.
CVE-2023-7043 can be exploited to execute a malicious program with NT AUTHORITY\NetworkService permissions.
Yes, exploiting CVE-2023-7043 requires an attacker to place a prepared program in a specific location before it can be executed on boot.