Project Hyphae

ClamAV Gets a Check-Up: Cisco Patches Critical Vulnerability to Keep Crustaceans Safe

Share This Post

Cisco has released security updates to address a severe vulnerability that affects the ClamAV open source antivirus engine, which could lead to remote code execution on vulnerable devices. The flaw resides in the HFS+ file parser component and is tracked as CVE-2023-20032. Versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier are affected. Successful exploitation of the weakness could allow an attacker to run arbitrary code with the same privileges as that of the ClamAV scanning process, or crash the process, leading to a denial-of-service (DoS) condition. Cisco has also addressed a remote information leak vulnerability in ClamAV’s DMG file parser (CVE-2023-20052), which could be exploited by an unauthenticated, remote attacker. Cisco recommends that customers upgrade to ClamAV versions 0.103.8, 0.105.2, and 1.0.1 to address both vulnerabilities.

Reach out to our incident response team for help

More To Explore

Information Security News 9-18-2023

Iranian Cyberspies Target Thousands of Organizations with Password Spray Attacks Article Link: Requests via Facebook Messenger Lead to Hijacked Business Accounts Article Link:

Information Security News 9-11-2023

University of Michigan Requires Password Resets After Cyberattack Article Link: Attackers Accessed UK Military Data Through High-Security Fencing Firm’s Windows 7 Rig Article Link:

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.