First published: Fri Aug 18 2023(Updated: )
A vulnerability in the AutoIt module of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a logic error in the memory management of an affected device. An attacker could exploit this vulnerability by submitting a crafted AutoIt file to be scanned by ClamAV on the affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to restart unexpectedly, resulting in a DoS condition.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Endpoint | <8.1.7.21585 | |
Cisco Secure Endpoint Private Cloud | <3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20212 is a vulnerability in the AutoIt module of ClamAV that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition on an affected device.
CVE-2023-20212 affects Cisco Secure Endpoint version up to 8.1.7.21585, potentially causing a DoS condition.
CVE-2023-20212 affects Cisco Secure Endpoint Private Cloud version up to 3.8.0, potentially causing a DoS condition.
CVE-2023-20212 has a severity rating of 7.5, indicating a high severity level.
The fix for CVE-2023-20212 is not mentioned in the provided reference.