5.5

CVE-2020-26941

A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET Smart Security Premium versions 13.2 and lower; ESET Endpoint Antivirus, ESET Endpoint Security, ESET NOD32 Antivirus Business Edition, ESET Smart Security Business Edition versions 7.3 and lower; ESET File Security for Microsoft Windows Server, ESET Mail Security for Microsoft Exchange Server, ESET Mail Security for IBM Domino, ESET Security for Kerio, ESET Security for Microsoft SharePoint Server versions 7.2 and lower.

Data is provided by the National Vulnerability Database (NVD)
EsetEndpoint Antivirus SwPlatform- Version <= 7.3
EsetEndpoint Security Version <= 7.3
EsetFile Security SwPlatformwindows_server Version <= 7.2
EsetInternet Security Version <= 13.2
EsetInternet Security Version1294
EsetMail Security SwPlatformdomino Version <= 7.2
EsetMail Security SwPlatformexchange_server Version <= 7.2
EsetNod32 Antivirus SwEditionbusiness Version <= 7.3
EsetNod32 Antivirus SwPlatform- Version <= 13.2
EsetSecurity SwPlatformkerio Version <= 7.2
EsetSecurity SwPlatformsharepoint_server Version <= 7.2
EsetSmart Security SwEditionbusiness Version <= 7.3
EsetSmart Security SwEdition- Version <= 13.2
EsetSmart Security SwEditionpremium Version <= 13.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.058
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
nvd@nist.gov 3.6 3.9 4.9
AV:L/AC:L/Au:N/C:N/I:P/A:P
CWE-276 Incorrect Default Permissions

During installation, installed file permissions are set to allow anyone to modify those files.