5.1

CVE-2025-2425

Time-of-check to time-of-use race condition vulnerability potentially allowed an attacker to use the installed ESET security software to clear the content of an arbitrary file on the file system.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorESET, spol. s.r.o
Product ESET NOD32 Antivirus
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Internet Security
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Smart Security Premium
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Security Ultimate
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Endpoint Antivirus for Windows
Default Statusunaffected
Version <= 12.0.2049.0
Version 0
Status affected
Version <= 11.1.2059.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Endpoint Security for Windows
Default Statusunaffected
Version <= 12.0.2049.0
Version 0
Status affected
Version <= 11.1.2059.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Small Business Security
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Safe Server
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Server Security for Windows Server
Default Statusunaffected
Version <= 12.0.12004.0
Version 0
Status affected
Version <= 11.1.12009.1
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Mail Security for Microsoft Exchange Server
Default Statusunaffected
Version <= 12.0.10003.0
Version 0
Status affected
Version <= 11.1.10011.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Security for Microsoft SharePoint Server
Default Statusunaffected
Version <= 12.0.15004.0
Version 0
Status affected
Version <= 11.1.15003.0
Version 0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.026
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
security@eset.com 5.1 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition

The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.