ClamAV Gets a Check-Up: Cisco Patches Critical Vulnerability to Keep Crustaceans Safe

Share This Post

Cisco has released security updates to address a severe vulnerability that affects the ClamAV open source antivirus engine, which could lead to remote code execution on vulnerable devices. The flaw resides in the HFS+ file parser component and is tracked as CVE-2023-20032. Versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier are affected. Successful exploitation of the weakness could allow an attacker to run arbitrary code with the same privileges as that of the ClamAV scanning process, or crash the process, leading to a denial-of-service (DoS) condition. Cisco has also addressed a remote information leak vulnerability in ClamAV’s DMG file parser (CVE-2023-20052), which could be exploited by an unauthenticated, remote attacker. Cisco recommends that customers upgrade to ClamAV versions 0.103.8, 0.105.2, and 1.0.1 to address both vulnerabilities.

https://thehackernews.com/2023/02/critical-rce-vulnerability-discovered.html

https://www.itnews.com.au/news/clamav-vulnerability-hits-cisco-security-software-591013



Reach out to our incident response team for help

More To Explore

Information Security News – 2/2/2026

FBI Seizes RAMP Cybercrime Forum Used by Ransomware Gangs Article Link: https://www.bleepingcomputer.com/news/security/fbi-seizes-ramp-cybercrime-forum-used-by-ransomware-gangs/ U.S. Charges 31 Suspects in Nationwide ATM Jackpotting Scam Article Link: https://hackread.com/us-charges-atm-jackpotting-scam-suspects/ Nike

Information Security News – 1/26/2026

The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time Article Link: https://unit42.paloaltonetworks.com/real-time-malicious-javascript-through-llms/ NIST, MITRE Announce $20 million Research

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.