Vulnerability Description
A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Clamav | Clamav | >= 1.0.0, < 1.0.8 |
| Cisco | Secure Endpoint | < 1.24.4 |
| Cisco | Secure Endpoint Private Cloud | < 4.2.0 |
Related Weaknesses (CWE)
References
- https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.htmlVendor Advisory
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/ciThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/09/msg00006.html
FAQ
What is CVE-2025-20128?
CVE-2025-20128 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected de...
How severe is CVE-2025-20128?
CVE-2025-20128 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-20128?
Check the references section above for vendor advisories and patch information. Affected products include: Clamav Clamav, Cisco Secure Endpoint, Cisco Secure Endpoint Private Cloud.