CVE-2021-37852

ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:azure:*:*:*
cpe:2.3:a:eset:server_security:8.0.12003.0:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:server_security:8.0.12003.1:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:-:windows:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-863 CWE-269

11 Feb 2022, 19:35

Type Values Removed Values Added
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-148/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-148/ - Third Party Advisory, VDB Entry
References (MISC) https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows - (MISC) https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows - Vendor Advisory
CPE cpe:2.3:a:eset:file_security:*:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:premium:windows:*:*
cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:server_security:8.0.12003.0:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:windows:*:*
cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint:*:*
cpe:2.3:a:eset:server_security:*:*:*:*:azure:*:*:*
cpe:2.3:a:eset:server_security:8.0.12003.1:*:*:*:*:windows_server:*:*
cpe:2.3:a:eset:smart_security:*:*:*:*:-:windows:*:*
cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:*
cpe:2.3:a:eset:internet_security:*:*:*:*:*:windows:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 7.8
First Time Eset file Security
Eset mail Security
Eset nod32 Antivirus
Eset internet Security
Eset endpoint Security
Eset server Security
Eset smart Security
Eset endpoint Antivirus
Eset security
Eset
CWE CWE-863

09 Feb 2022, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-09 06:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-37852

Mitre link : CVE-2021-37852

CVE.ORG link : CVE-2021-37852


JSON object : View

Products Affected

eset

  • smart_security
  • endpoint_security
  • endpoint_antivirus
  • security
  • file_security
  • nod32_antivirus
  • internet_security
  • mail_security
  • server_security
CWE
CWE-269

Improper Privilege Management