U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-0353

Change History

Initial Analysis by NIST 1/23/2025 12:18:06 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST NVD-CWE-noinfo
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:* versions up to (excluding) 8.1.2062.0
     *cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:* versions from (including) 9.0 up to (excluding) 9.1.2071.0
     *cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:* versions from (including) 10.0 up to (excluding) 10.0.2052.0
     *cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:* versions from (including) 10.1 up to (excluding) 10.1.2063.0
     *cpe:2.3:a:eset:endpoint_antivirus:*:*:*:*:*:windows:*:* versions from (including) 11.0 up to (excluding) 11.0.2032.0
     *cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:* versions up to (excluding) 8.1.2062.0
     *cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:* versions from (including) 9.0 up to (excluding) 9.1.2071.0
     *cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:* versions from (including) 10.0 up to (excluding) 10.0.2052.0
     *cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:* versions from (including) 10.1 up to (excluding) 10.1.2063.0
     *cpe:2.3:a:eset:endpoint_security:*:*:*:*:*:windows:*:* versions from (including) 11.0 up to (excluding) 11.0.2032.0
     *cpe:2.3:a:eset:file_security:*:*:*:*:*:azure:*:*
     *cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:* versions up to (excluding) 17.0.10.0
     *cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:* versions up to (excluding) 7.3.10018.0
     *cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:* versions up to (excluding) 7.3.14006.0
     *cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:* versions from (including) 8.0 up to (excluding) 8.0.10024.0
     *cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:* versions from (including) 8.0 up to (excluding) 8.0.14014.0
     *cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:* versions from (including) 9.0 up to (excluding) 9.0.10012.0
     *cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:* versions from (including) 9.0 up to (excluding) 9.0.14008.0
     *cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:* versions from (including) 10.0 up to (excluding) 10.0.10018.0
     *cpe:2.3:a:eset:mail_security:*:*:*:*:*:domino:*:* versions from (including) 10.0 up to (excluding) 10.0.14007.0
     *cpe:2.3:a:eset:mail_security:*:*:*:*:*:exchange_server:*:* versions from (including) 10.1 up to (excluding) 10.1.10014.0
     *cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:* versions up to (excluding) 17.0.10.0
     *cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:* versions up to (excluding) 7.3.15006.0
     *cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:* versions from (including) 8.0 up to (excluding) 8.0.15012.0
     *cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:* versions from (including) 9.0 up to (excluding) 9.0.15006.0
     *cpe:2.3:a:eset:security:*:*:*:*:*:sharepoint_server:*:* versions from (including) 10.0 up to (excluding) 10.0.15005.0
     *cpe:2.3:a:eset:security:*:*:*:*:ultimate:*:*:* versions up to (excluding) 17.0.10.0
     *cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:* versions up to (excluding) 7.3.12013.0
     *cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:* versions from (including) 8.0 up to (excluding) 8.0.12016.0
     *cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:* versions from (including) 9.0 up to (excluding) 9.0.12019.0
     *cpe:2.3:a:eset:server_security:*:*:*:*:*:windows_server:*:* versions from (including) 10.0 up to (excluding) 10.0.12015.0
     *cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:* versions up to (excluding) 17.0.10.0
Changed Reference Type
https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html No Types Assigned
https://packetstormsecurity.com/files/179495/ESET-NOD32-Antivirus-17.2.7.0-Unquoted-Service-Path.html Broken Link
Changed Reference Type
https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html No Types Assigned
https://packetstormsecurity.com/files/182464/ESET-NOD32-Antivirus-18.0.12.0-Unquoted-Service-Path.html Broken Link
Changed Reference Type
https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed No Types Assigned
https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed Vendor Advisory
Changed Reference Type
https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed No Types Assigned
https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed Vendor Advisory