Cisco closes the antivirus decommissioning bug as a source of exploit code

However, the company noted that the stability of the entire system remained intact despite the successful exploitation of the bug.

I error can disable AV scanning

The flaw, despite being a critical issue, can damage critical scanning processes for ClamAV users who use it for various protections including email scanning, web filtering, and endpoint security.

“An attacker could exploit this vulnerability by sending a crafted file containing OLE2 to be scanned by ClamAV on an affected device,” the advisory added. “Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability.”


Source link