7.8
CWE
269
Advisory Published
Updated

CVE-2024-0353: Local privilege escalation in Windows products

First published: Thu Feb 15 2024(Updated: )

Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.

Credit: security@eset.com

Affected SoftwareAffected VersionHow to fix
ESET ESET
ESET Endpoint Antivirus Windows<8.1.2062.0
ESET Endpoint Antivirus Windows>=9.0<9.1.2071.0
ESET Endpoint Antivirus Windows>=10.0<10.0.2052.0
ESET Endpoint Antivirus Windows>=10.1<10.1.2063.0
ESET Endpoint Antivirus Windows>=11.0<11.0.2032.0
ESET Endpoint Security Windows<8.1.2062.0
ESET Endpoint Security Windows>=9.0<9.1.2071.0
ESET Endpoint Security Windows>=10.0<10.0.2052.0
ESET Endpoint Security Windows>=10.1<10.1.2063.0
ESET Endpoint Security Windows>=11.0<11.0.2032.0
ESET File Security for Azure
ESET Internet Security<17.0.10.0
ESET Mail Security for Microsoft Exchange Server<7.3.10018.0
ESET Mail Security for IBM Domino<7.3.14006.0
ESET Mail Security for Microsoft Exchange Server>=8.0<8.0.10024.0
ESET Mail Security for IBM Domino>=8.0<8.0.14014.0
ESET Mail Security for Microsoft Exchange Server>=9.0<9.0.10012.0
ESET Mail Security for IBM Domino>=9.0<9.0.14008.0
ESET Mail Security for Microsoft Exchange Server>=10.0<10.0.10018.0
ESET Mail Security for IBM Domino>=10.0<10.0.14007.0
ESET Mail Security for Microsoft Exchange Server>=10.1<10.1.10014.0
ESET NOD32 Antivirus<17.0.10.0
ESET Mail Security for Microsoft SharePoint Server<7.3.15006.0
ESET Security<17.0.10.0
ESET Mail Security for Microsoft SharePoint Server>=8.0<8.0.15012.0
ESET Mail Security for Microsoft SharePoint Server>=9.0<9.0.15006.0
ESET Mail Security for Microsoft SharePoint Server>=10.0<10.0.15005.0
ESET File Security for Windows Server<7.3.12013.0
ESET File Security for Windows Server>=8.0<8.0.12016.0
ESET File Security for Windows Server>=9.0<9.0.12019.0
ESET File Security for Windows Server>=10.0<10.0.12015.0
ESET Smart Security for Windows<17.0.10.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-0353?

    CVE-2024-0353 is classified as a local privilege escalation vulnerability.

  • How do I fix CVE-2024-0353?

    To fix CVE-2024-0353, ensure that you update your ESET software to the latest version provided by ESET.

  • What products are affected by CVE-2024-0353?

    CVE-2024-0353 affects several ESET products including ESET Endpoint Antivirus, ESET Internet Security, and ESET File Security.

  • Can CVE-2024-0353 allow unauthorized file deletions?

    Yes, CVE-2024-0353 may allow an attacker to misuse file operations to delete files without the appropriate permissions.

  • Is there a public advisory for CVE-2024-0353?

    Yes, ESET has issued a customer advisory regarding CVE-2024-0353 that details the vulnerability and recommended actions.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203