Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3716: CWE-204 Observable response discrepancy in ESET, spol. s.r.o ESET Protect (on-prem)

0
Medium
VulnerabilityCVE-2025-3716cvecve-2025-3716cwe-204
Published: Mon Mar 30 2026 (03/30/2026, 07:30:30 UTC)
Source: CVE Database V5
Vendor/Project: ESET, spol. s.r.o
Product: ESET Protect (on-prem)

Description

User enumeration in ESET Protect (on-prem) via Response Timing.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 19:15:00 UTC

Technical Analysis

CVE-2025-3716 is a vulnerability classified under CWE-204 (Observable Response Discrepancy) affecting ESET Protect (on-prem), a security management platform by ESET, spol. s.r.o. The flaw enables an unauthenticated remote attacker to enumerate valid usernames by measuring differences in response timing when the system processes authentication or user validation requests. Specifically, the server responds faster or slower depending on whether the username exists, allowing attackers to infer valid accounts without needing credentials or user interaction. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability (VC:N, VI:N, VA:L). Although the direct impact on system security is limited, user enumeration can be leveraged as a preliminary step for more damaging attacks such as password guessing, social engineering, or lateral movement within networks. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. The vulnerability affects on-premises deployments of ESET Protect, which is used by enterprises for endpoint security management, making it relevant primarily to organizations with such installations.

Potential Impact

The primary impact of this vulnerability is the disclosure of valid usernames within an organization's ESET Protect on-prem environment. This information leakage can significantly aid attackers in crafting targeted attacks, including brute force password attempts, phishing campaigns, and social engineering exploits. While the vulnerability does not directly compromise system confidentiality, integrity, or availability, it lowers the barrier for attackers to gain unauthorized access by revealing legitimate account names. This can lead to increased risk of account compromise, unauthorized access to sensitive security management functions, and potential lateral movement within enterprise networks. Organizations relying heavily on ESET Protect for endpoint security management may face increased risk exposure, particularly if combined with other vulnerabilities or weak credential policies. The lack of required authentication or user interaction makes exploitation feasible remotely, increasing the threat surface. However, since no known exploits are currently active, the immediate risk is moderate but warrants proactive mitigation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor ESET’s official channels for patches or updates addressing CVE-2025-3716 and apply them promptly once available. In the interim, network-level controls such as restricting access to the ESET Protect management interface to trusted IP addresses or VPNs can reduce exposure. Implementing rate limiting and anomaly detection on authentication endpoints can help detect and block enumeration attempts. Additionally, reviewing and hardening user account policies—such as enforcing strong, unique passwords and multi-factor authentication—can reduce the impact of user enumeration. Logging and monitoring for unusual access patterns or repeated failed authentication attempts should be enhanced. Security teams should also educate users about phishing risks that may arise from leaked usernames. Finally, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) capable of detecting timing-based enumeration attacks to provide an additional layer of defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ESET
Date Reserved
2025-04-16T08:51:43.823Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ca2f86e6bfc5ba1dec6011

Added to database: 3/30/2026, 8:08:38 AM

Last enriched: 3/30/2026, 7:15:00 PM

Last updated: 5/14/2026, 1:07:02 PM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses