ClamAV Gets a Check-Up: Cisco Patches Critical Vulnerability to Keep Crustaceans Safe

Share This Post

Cisco has released security updates to address a severe vulnerability that affects the ClamAV open source antivirus engine, which could lead to remote code execution on vulnerable devices. The flaw resides in the HFS+ file parser component and is tracked as CVE-2023-20032. Versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier are affected. Successful exploitation of the weakness could allow an attacker to run arbitrary code with the same privileges as that of the ClamAV scanning process, or crash the process, leading to a denial-of-service (DoS) condition. Cisco has also addressed a remote information leak vulnerability in ClamAV’s DMG file parser (CVE-2023-20052), which could be exploited by an unauthenticated, remote attacker. Cisco recommends that customers upgrade to ClamAV versions 0.103.8, 0.105.2, and 1.0.1 to address both vulnerabilities.

https://thehackernews.com/2023/02/critical-rce-vulnerability-discovered.html

https://www.itnews.com.au/news/clamav-vulnerability-hits-cisco-security-software-591013



Reach out to our incident response team for help

More To Explore

Information Security News – 12/22/2025

Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files Article Link: https://www.darkreading.com/threat-intelligence/flaw-hacktivist-ransomware-victims-decrypt-files Initial Access Brokers Involved in More Attacks, Including on Critical Infrastructure Article Link:

Information Security News – 12/15/2025

CISA Warns Microsoft Windows Users—Log Out and Shut Down Article Link: https://www.forbes.com/sites/zakdoffman/2025/12/09/cisa-warns-microsoft-windows-users-log-out-and-shut-down/ Data Brokers are Exposing Medical Professionals, and Turning Their Personal Lives into Open

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.