Vulnerability discovered in ESET anti-virus software could allow hackers to gain system privileges on Windows
The well-known internet security company ESET has urgently released a series of patches to completely address a high-severity local security vulnerability that affects many ESET antivirus software products running on Windows computers. Windows 10 or Windows Server 2016 or later systems worldwide.
This vulnerability, with a tracking identifier of CVE-2021-37852, was first reported by security researcher Michael DePlante from the Trend Micro team. According to the analysis results, this is considered an extremely dangerous vulnerability because it allows attackers to take over and upgrade privileges to the NT AUTHORITYSYSTEM account (the highest privilege level on Windows systems). by abusing Windows Antimalware Scan Interface (AMSI).
AMSI was first introduced with Windows 10 Technical Preview in 2015. It is a tool designed to allow applications and services to request a memory cache scan from any major anti-virus software installed. installed on the system.
According to ESET, the danger can only appear after attackers gain SeImpersonatePrivilege permissions, which are usually assigned to users in the Local Administrators group and the Local Service account. of the device to impersonate a client after authentication. This will "limit the impact of this vulnerability". This somewhat limits the impact of the vulnerability in practice.
However, the warning from ZDI states that attackers also only need to "gain the ability to execute low-privileged code on the target system" to abuse the vulnerability. This is consistent with ESET's CVSS severity rating, and also shows that the vulnerability can be exploited by low-privileged threat actors.
Affected ESET products
The list of ESET software products affected by this vulnerability is quite long, including:
- ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security and ESET Smart Security Premium from versions 10.0.337.1 to 15.0.18.0.
- ESET Endpoint Antivirus for Windows and ESET Endpoint Security for Windows from versions 6.6.2046.0 to 9.0.2032.4.
- ESET Server Security for Microsoft Windows Server 8.0.12003.0 and 8.0.12003.1, ESET File Security for Microsoft Windows Server from versions 7.0.12014.0 to 7.3.2006.0.
- ESET Server Security for Microsoft Azure from version 7.0.12016.1002 to 7.2.12004.1000.
- ESET Security for Microsoft SharePoint Server from version 7.0.15008.0 to 8.0.15004.0.
- ESET Mail Security for IBM Domino from version 7.0.14008.0 to 8.0.14004.0.
- ESET Mail Security for Microsoft Exchange Server from version 7.0.10019 to 8.0.10016.0.
ESET Server Security for Microsoft Azure users are also advised to immediately update ESET File Security for Microsoft Azure to the latest available version of ESET Server Security for Microsoft Windows Server to resolve the issue.
ESET has released multiple security updates between December 8 and January 31 to address this vulnerability. This is quite a remarkable effort. Fortunately, ESET has not (yet) found any evidence of the vulnerability being exploited in the wild.
"The attack surface can also be eliminated by disabling the Enable advanced scanning via AMSI option in the Advanced Setup of ESET products. However, we strongly recommend that you perform the upgrade to the product version. fixed product and only apply this solution when it is not possible to update to the new version for some important reason,' the warning from ESET said.
You should read it
- Quickly download and use ESET SMART SECURITY® for 6 months free of charge
- ESET Cybersecurity security software for Mac
- 12-year vulnerability in pkexec gives hackers root privileges on Linux
- McAfee software has a vulnerability that allows hackers to run code with system privileges on Windows
- ESET launched NOD32 Antivirus 5 and Smart Security 5
- Discover more ways to attack the printing system in Windows
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windows
- How to check if a process is running with admin privileges in Windows 11
May be interested
- More than 40 Windows drivers contain dangerous privilege escalation vulnerabilitiesthere are more than 40 different drivers containing vulnerabilities that contain holes or poor code that can be exploited by hackers ...
- Virus tracking software 'draw lines' for hackersprograms that monitor and record unusual phenomena on the internet because security companies set up secrets are being discovered by hackers and take advantage of their attacks.
- Immediately patch CWP vulnerability that allows code execution as root on Linux serverssecurity researchers have discovered two new vulnerabilities affecting control web panel (cwp) software. hackers could chain these two vulnerabilities to gain remote code execution (rce) privileges as root on vulnerable linux servers.
- Mozilla patches a vulnerability in Firefox that helps hackers gain admin rights of Windowsmozilla has just released a security update to patch a critical security vulnerability that allows hackers to escalate privileges on windows computers. this critical security flaw has been patched in the recently released version of firefox 97.
- New virus outbreaks occur via USBvirus surveillance system of bkav security company has just discovered a new virus w32.usbfakedrive has a speed of infection. experts say this will be a malicious code to replace the autorun virus strains, spread via usb before.
- Scan for viruses - spyware does not need to install softwaredo you suspect that your computer is infected with the virus, but the anti-virus program on your computer is inefficient or your computer has not had any program to fight the virus?
- ESET launched NOD32 Antivirus 5 and Smart Security 5at eset bratislava, proactive protection leaders against the threat of computer information systems, announced the launch of leading products ...
- The most destructive virus evera virus has been discovered that microsoft listed as the most destructive product ever. the virus was discovered by mcafee in the afternoon of october 31.
- Online games in Asia are attacked by trojanseset's threatsense.net virus scanning tool has detected a significant number of w32 / psw.agent.ndp infected computers in millions of computers around the world. the trojan steals information stored on the computer, then sends it to an owner hacker.
- How to assign Administrator permissions on a Windows 7 computer?if you use windows 7, in some situations you will encounter an error that the system does not assign admin rights to store, use some programs on the hard drive system .... to fix this error you can refer to some answers below.