Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Cisco patches antivirus decommissioning bug as exploit code surfaces
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Cisco patches antivirus decommissioning bug as exploit code surfaces

Cisco has patched a denial-of-service (DoS) vulnerability affecting its open-source antivirus software toolkit, ClamAV, which already has a proof-of-concept (PoC) exploit code available to the public.Identified as CVE-2025-20128, the vulnerability stems from a heap-based buffer overflow in the Object Linking and Embedding 2 (OLE2) decryption routine, enabling unauthenticated remote attackers to cause a DoS condition on affected devices.”This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read,” Cisco said in an advisory. “A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.”However, the company noted that the overall system stability remains intact despite the successful exploitation of the flaw. The flaw, despite being a medium severity issue, could compromise critical scanning processes for ClamAV users who use it for a range of protection including email scanning, web filtering, and endpoint security.”An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device,” the advisory added. “The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability.”Affected Cisco software platforms include Secure Endpoint Connector for Linux, Secure Endpoint Connector for Mac, Secure Endpoint Connector for Windows, and Secure Endpoint Private Cloud.Cisco confirmed the vulnerability does not affect its “Secure Email Gateway” and “Secure Web Appliances” products, two Cisco solutions for email and web-based threats that ClamAV integrates with for comprehensive support.

Patching is the only workaround

In a separate ClamAV blog, the Cisco team provided details of the security patches released to address this flaw. The patch rollout includes ClamAV release 1.4.2 and ClamAV release 1.0.8, both available for download on the ClamAV downloads page, Github release page, and through Docker Hub.Patching their affected software is the only option for users as the company said there are no workarounds that address this vulnerability.The company said in the advisory that it is not aware of any active exploitation of the vulnerability, and credited Google’s fuzzing team, OSS-Fuzz, for reporting it. Cisco’s anti-malware toolkit has encountered its second denial-of-service (DoS) vulnerability within a year. The first, identified in February 2024, allowed much similar sabotage but was rated more severe than the current flaw.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3808598/cisco-patches-antivirus-decommissioning-bug-as-exploit-code-surfaces.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link