Description

Cisco has issued security updates to address a critical denial-of-service (DoS) vulnerability in ClamAV, identified as CVE-2025-20128. This vulnerability stems from a heap-based buffer overflow in the OLE2 decryption routine, which could enable remote attackers without authentication to create a DoS condition on affected systems. Exploitation of this flaw could cause the ClamAV antivirus scanning process to crash, leading to disruptions in scanning operations, although the overall stability of the affected system would remain intact. An attacker could exploit this vulnerability by submitting a specially crafted file containing OLE2 content for scanning by ClamAV on a vulnerable system. If successful, the attack would terminate the ClamAV scanning process, resulting in a DoS condition. While proof-of-concept (PoC) exploit code is available, Cisco’s Product Security Incident Response Team (PSIRT) has reported no evidence of active exploitation in the wild to date. The vulnerability impacts the Secure Endpoint Connector software, used on Linux, Mac, and Windows systems to transmit logs and events from Cisco Secure Endpoint to security information and event management (SIEM) solutions such as Microsoft Sentinel. In addition to this advisory, Cisco has released patches for other security issues, including a DoS vulnerability in Cisco BroadWorks (CVE-2025-20165) and a critical privilege escalation flaw in the Cisco Meeting Management REST API (CVE-2025-20156), which could allow attackers to obtain administrative access on affected systems. Earlier, Cisco also addressed other significant vulnerabilities in 2024, such as a DoS flaw in Cisco ASA and Firepower Threat Defense software (CVE-2024-20481) and a critical issue in Ultra-Reliable Wireless Backhaul (URWB) industrial access points (CVE-2024-20418). These updates reflect Cisco’s continued commitment to securing its products against evolving threats.