Cybersecurity firm ESET released security patches for two local privilege escalation vulnerabilities impacting Windows and macOS products.<\/p>\n\n\n\n
The first vulnerability, tracked as CVE-2024-7400 (CVSS score of 7.3), could allow an attacker to misuse ESET\u2019s file operations during the removal of a detected file to delete files without having proper permissions to do so.<\/p>\n\n\n\n
The vulnerability impacts Windows OS, Positive Technologies Dmitriy Zuzlov reported the issue to ESET.<\/p>\n\n\n\n
“The vulnerability in the file operations handling during the removal of a detected file potentially allowed an attacker with an ability to execute low-privileged code on the target system to delete arbitrary files, thus escalating their privileges.” reads<\/strong><\/a> the advisory. “ESET fixed the issue in the Cleaner module 1251, which was distributed automatically to ESET customers along with Detection engine updates. No action stemming from this advisory is required to be taken by ESET customers.”<\/em><\/p>\n\n\n\n
The vulnerability impacts the following programs and versions:<\/p>\n\n\n\n
ESET also addressed a local privilege escalation vulnerability, tracked as CVE-2024-6654 (CVSS score 6.8), in macOS products.<\/p>\n\n\n\n
The vulnerability allows a logged user to perform a denial-of-service attack, which could be misused to disable the ESET security product and cause general system slow-down. <\/p>\n\n\n\n
“ESET received a report stating that on a machine with the affected ESET product installed, it was possible for a user with low privileges to plant a symlink to a specific location, preventing ESET security product from starting properly.” reads the advisory<\/a>.<\/p>\n\n\n\n
The flaw impacts the following products:<\/p>\n\n\n\n
The company released Cyber Security version 7.5.74.0 and Endpoint Security for macOS version 8.0.7200.0 to address this issue. <\/p>\n\n\n\n
The security firm is not aware of public exploits for both vulnerabilities.\u00a0<\/p>\n\n\n\n
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/strong><\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, Privilege Escalation)<\/strong>