6.8

CVE-2025-5028

Installation file of ESET security products on Windows 

allow an attacker to misuse to delete an arbitrary file without having the permissions to do so.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerESET, spol. s.r.o
Produkt ESET NOD32 Antivirus
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
HerstellerESET, spol. s.r.o
Produkt ESET Internet Security
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
HerstellerESET, spol. s.r.o
Produkt ESET Smart Security Premium
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
HerstellerESET, spol. s.r.o
Produkt ESET Security Ultimate
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
HerstellerESET, spol. s.r.o
Produkt ESET Endpoint Antivirus for Windows
Default Statusunaffected
Version <= 12.0.2049.0
Version 0
Status affected
Version <= 11.1.2059.0
Version 0
Status affected
HerstellerESET, spol. s.r.o
Produkt ESET Endpoint Security for Windows
Default Statusunaffected
Version <= 12.0.2049.0
Version 0
Status affected
Version <= 11.1.2059.0
Version 0
Status affected
HerstellerESET, spol. s.r.o
Produkt ESET Small Business Security
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
HerstellerESET, spol. s.r.o
Produkt ESET Safe Server
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.024
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security@eset.com 6.8 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.