A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.
For a description of this vulnerability, see the .
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
03 Nov 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-01-22 17:15
Updated : 2025-11-03 19:15
NVD link : CVE-2025-20128
Mitre link : CVE-2025-20128
CVE.ORG link : CVE-2025-20128
JSON object : View
Products Affected
cisco
- secure_endpoint_private_cloud
- secure_endpoint
clamav
- clamav
CWE
CWE-122
Heap-based Buffer Overflow
