{"api_version":"1","generated_at":"2026-04-23T04:09:05+00:00","cve":"CVE-2016-9892","urls":{"html":"https://cve.report/CVE-2016-9892","api":"https://cve.report/api/cve/CVE-2016-9892.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-9892","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-9892"},"summary":{"title":"CVE-2016-9892","description":"The esets_daemon service in ESET Endpoint Antivirus for macOS before 6.4.168.0 and Endpoint Security for macOS before 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide crafted responses to license activation requests via a self-signed certificate.  NOTE: this issue can be combined with CVE-2016-0718 to execute arbitrary code remotely as root.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2017-03-02 23:59:00","updated_at":"2017-03-16 15:20:00"},"problem_types":["CWE-295"],"metrics":[],"references":[{"url":"http://seclists.org/fulldisclosure/2017/Feb/68","name":"20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6","refsource":"FULLDISC","tags":["Exploit","Mailing List"],"title":"Full Disclosure: CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html","name":"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"ESET Endpoint Antivirus 6 Remote Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/96462","name":"96462","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"ESET Endpoint Antivirus CVE-2016-9892 Remote Code Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://support.eset.com/ca6333/","name":"http://support.eset.com/ca6333/","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Remote execution and privilege escalation vulnerabilities in ESET products for macOS fixed—ESET Knowledgebase","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-9892","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9892","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"9892","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"eset","cpe5":"endpoint_antivirus","cpe6":"6.3.70.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"macos","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9892","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"eset","cpe5":"endpoint_antivirus","cpe6":"6.3.70.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"macos","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9892","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"eset","cpe5":"endpoint_security","cpe6":"6.3.70.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"macos","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9892","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"eset","cpe5":"endpoint_security","cpe6":"6.3.70.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"macos","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2016-9892","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The esets_daemon service in ESET Endpoint Antivirus for macOS before 6.4.168.0 and Endpoint Security for macOS before 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide crafted responses to license activation requests via a self-signed certificate.  NOTE: this issue can be combined with CVE-2016-0718 to execute arbitrary code remotely as root."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://support.eset.com/ca6333/","refsource":"CONFIRM","url":"http://support.eset.com/ca6333/"},{"name":"20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2017/Feb/68"},{"name":"96462","refsource":"BID","url":"http://www.securityfocus.com/bid/96462"},{"name":"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html"}]}},"nvd":{"publishedDate":"2017-03-02 23:59:00","lastModifiedDate":"2017-03-16 15:20:00","problem_types":["CWE-295"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:eset:endpoint_security:6.3.70.1:*:*:*:*:macos:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:eset:endpoint_antivirus:6.3.70.1:*:*:*:*:macos:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"9892","Ordinal":"100006","Title":"CVE-2016-9892","CVE":"CVE-2016-9892","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"9892","Ordinal":"1","NoteData":"The esets_daemon service in ESET Endpoint Antivirus for macOS before 6.4.168.0 and Endpoint Security for macOS before 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide crafted responses to license activation requests via a self-signed certificate.  NOTE: this issue can be combined with CVE-2016-0718 to execute arbitrary code remotely as root.","Type":"Description","Title":null},{"CveYear":"2016","CveId":"9892","Ordinal":"2","NoteData":"2017-03-02","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"9892","Ordinal":"3","NoteData":"2017-03-02","Type":"Other","Title":"Modified"}]}}}