Vulnerability Details CVE-2022-27167
Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 15.3%
CVSS Severity
CVSS v3 Score 7.1
CVSS v2 Score 3.6
Products affected by CVE-2022-27167
-
cpe:2.3:a:eset:endpoint_antivirus:6.6.2046.0
-
cpe:2.3:a:eset:endpoint_antivirus:7.3.2055.0
-
cpe:2.3:a:eset:endpoint_antivirus:8.0
-
cpe:2.3:a:eset:endpoint_antivirus:8.0.2028.3
-
cpe:2.3:a:eset:endpoint_antivirus:8.1
-
cpe:2.3:a:eset:endpoint_antivirus:8.1.2031.4
-
cpe:2.3:a:eset:endpoint_antivirus:9.0
-
cpe:2.3:a:eset:endpoint_antivirus:9.0.2032.6
-
cpe:2.3:a:eset:endpoint_security:6.6.2046.0
-
cpe:2.3:a:eset:endpoint_security:7.3.2055.0
-
cpe:2.3:a:eset:endpoint_security:8.0
-
cpe:2.3:a:eset:endpoint_security:8.0.2028.3
-
cpe:2.3:a:eset:endpoint_security:8.1
-
cpe:2.3:a:eset:endpoint_security:8.1.2031.4
-
cpe:2.3:a:eset:endpoint_security:9.0
-
cpe:2.3:a:eset:endpoint_security:9.0.2032.6
-
cpe:2.3:a:eset:file_security:7.0.12014.0
-
cpe:2.3:a:eset:file_security:7.2
-
cpe:2.3:a:eset:file_security:7.3.12008.0
-
cpe:2.3:a:eset:internet_security:15.0.18.0
-
cpe:2.3:a:eset:mail_security:7.0.10019
-
cpe:2.3:a:eset:mail_security:7.0.14008.0
-
cpe:2.3:a:eset:mail_security:7.2
-
cpe:2.3:a:eset:mail_security:7.3.10014.0
-
cpe:2.3:a:eset:mail_security:7.3.10018.0
-
cpe:2.3:a:eset:mail_security:7.3.14003.0
-
cpe:2.3:a:eset:mail_security:7.3.14006.0
-
cpe:2.3:a:eset:mail_security:8.0
-
cpe:2.3:a:eset:mail_security:8.0.10012.0
-
cpe:2.3:a:eset:mail_security:8.0.10018.0
-
cpe:2.3:a:eset:mail_security:8.0.14006.0
-
cpe:2.3:a:eset:mail_security:8.0.14010.0
-
cpe:2.3:a:eset:nod32_antivirus:15.0.18.0
-
cpe:2.3:a:eset:security:7.2
-
cpe:2.3:a:eset:security:7.3.15006.0
-
cpe:2.3:a:eset:security:8.0
-
cpe:2.3:a:eset:server_security:*
-
cpe:2.3:a:eset:server_security:8.0
-
cpe:2.3:a:eset:server_security:8.0.12003.0
-
cpe:2.3:a:eset:server_security:8.0.12003.1
-
cpe:2.3:a:eset:server_security:8.0.12015.0
-
cpe:2.3:a:eset:server_security:8.0.12016.0
-
cpe:2.3:a:eset:server_security:9.0
-
cpe:2.3:a:eset:smart_security:15.0.18.0