Search for vulnerabilities
Vulnerability details: VCID-63n4-pk65-5kbm
Vulnerability ID VCID-63n4-pk65-5kbm
Aliases CVE-2025-20234
Summary A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the .
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00093 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00104 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00104 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00104 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00104 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00104 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00104 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
epss 0.00109 https://api.first.org/data/v1/epss?cve=CVE-2025-20234
cvssv3.1 5.3 https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html
ssvc Track https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2025-20234
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2025-20234
cvssv3.1 5.3 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-udf-hmwd9nDy
ssvc Track https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-udf-hmwd9nDy
archlinux Critical https://security.archlinux.org/AVG-2903
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2025-20234
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1108045 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108045
AVG-2903 https://security.archlinux.org/AVG-2903
cisco-sa-clamav-udf-hmwd9nDy https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-udf-hmwd9nDy
clamav-143-and-109-security-patch.html https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html
cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*
cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*
cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*
cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*
CVE-2025-20234 https://nvd.nist.gov/vuln/detail/CVE-2025-20234
USN-7615-1 https://usn.ubuntu.com/7615-1/
USN-7615-2 https://usn.ubuntu.com/7615-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T18:20:31Z/ Found at https://blog.clamav.net/2025/06/clamav-143-and-109-security-patch.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2025-20234
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2025-20234
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-udf-hmwd9nDy
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T18:20:31Z/ Found at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-udf-hmwd9nDy
Exploit Prediction Scoring System (EPSS)
Percentile 0.27178
EPSS Score 0.00093
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:55:20.287430+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/7615-1/ 37.0.0