Search for vulnerabilities
Vulnerability details: VCID-k3zc-f8ax-v3ag
Vulnerability ID VCID-k3zc-f8ax-v3ag
Aliases CVE-2025-20128
Summary A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Status Published
Exploitability 0.5
Weighted Severity 3.2
Risk 1.6
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00243 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00401 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00543 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00648 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.00783 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
epss 0.01229 https://api.first.org/data/v1/epss?cve=CVE-2025-20128
cvssv3.1 5.3 https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
ssvc Track https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
cvssv3.1 5.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.3 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
ssvc Track https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T16:54:39Z/ Found at https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T16:54:39Z/ Found at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA
Exploit Prediction Scoring System (EPSS)
Percentile 0.43167
EPSS Score 0.00232
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-03-28T07:15:36.433895+00:00 Debian Importer Import https://security-tracker.debian.org/tracker/data/json 36.0.0