6.8

CVE-2025-5028

Installation file of ESET security products on Windows 

allow an attacker to misuse to delete an arbitrary file without having the permissions to do so.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorESET, spol. s.r.o
Product ESET NOD32 Antivirus
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Internet Security
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Smart Security Premium
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Security Ultimate
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Endpoint Antivirus for Windows
Default Statusunaffected
Version <= 12.0.2049.0
Version 0
Status affected
Version <= 11.1.2059.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Endpoint Security for Windows
Default Statusunaffected
Version <= 12.0.2049.0
Version 0
Status affected
Version <= 11.1.2059.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Small Business Security
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
VendorESET, spol. s.r.o
Product ESET Safe Server
Default Statusunaffected
Version <= 18.1.13.0
Version 0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.024
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
security@eset.com 6.8 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.