![]() ![]() However, ESET recommends applying the workaround only if the upgrade to a patched product version is not possible. The company also notes that the vulnerability can be mitigated by heading to a product’s Advanced setup section and disabling the “Enable advanced scanning via AMSI” option. The security error impacts multiple versions of ESET NOD32 Antivirus, Internet Security, Smart Security and Smart Security Premium, Endpoint Antivirus and Endpoint Security for Windows, Server Security and File Security for Windows Server, Server Security for Azure, Security for SharePoint Server, and Mail Security for IBM Domino and for Exchange Server.ĮSET released a series of patches for the vulnerability in December 2021, and then followed up with fixes for older versions of its Windows products in January 2022. However, since these accounts are highly privileged, the impact of the bug is limited, ESET says. The cybersecurity firm also notes that, by default, the local Administrators group and the device’s Local Service accounts have access to SeImpersonatePrivilege. “An attacker who is able to get SeImpersonatePrivilege can misuse the AMSI scanning feature to elevate to NT AUTHORITYSYSTEM in some cases,” ESET explains in an advisory. Tracked as CVE-2021-37852 and reported to ESET by the Zero Day Initiative (ZDI), the vulnerability is considered “high severity,” as it could allow an attacker to misuse the AMSI scanning feature. Antivirus firm ESET on Monday announced patches for a local privilege escalation vulnerability impacting its Windows clients. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |