SARA / Free Tools / CVE / CVE-2023-3160

CVE-2023-3160 — The vulnerability potentially allows an attacker to misuse ESET’s file operation

The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.

CVSS
7.8 HIGH
EPSS
4.00% (top 86.80%)
CWE
CWE-269
Published
2023-08-14T09:27:02.427Z
Last modified
2024-10-09T20:04:15.607Z
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

01What is this vulnerability?

The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.

02Affected products

VendorProductVersions
ESET, spol. s r.o.ESET NOD32 Antivirus1463
ESET, spol. s r.o.ESET Internet Security1463
ESET, spol. s r.o.ESET Smart Security Premium1463
ESET, spol. s r.o.ESET Endpoint Antivirus1463
ESET, spol. s r.o.ESET Endpoint Security1463
ESET, spol. s r.o.ESET Server Security for Windows Server (File Security)1463
ESET, spol. s r.o.ESET Mail Security for Microsoft Exchange Server1463
ESET, spol. s r.o.ESET Mail Security for IBM Domino1463
ESET, spol. s r.o.ESET Security for Microsoft SharePoint Server1463

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →