2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2023-20052" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2023-03-01T08:15:11.980" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:40:26.643" ,
2023-10-01 12:00:27 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2023-10-01 12:00:27 +00:00
"value" : "On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:\r\n\r \r A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device.\r\n\r \r This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
}
]
} ,
"weaknesses" : [
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-611"
2023-04-24 12:24:31 +02:00
}
]
2024-01-25 19:00:44 +00:00
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-01-25 19:00:44 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-776"
2024-01-25 19:00:44 +00:00
}
]
2023-04-24 12:24:31 +02:00
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*" ,
"versionEndExcluding" : "1.20.2" ,
"matchCriteriaId" : "40572314-306A-4594-A279-216B8139B7A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*" ,
"versionEndExcluding" : "1.21.1" ,
"matchCriteriaId" : "726A787E-E64F-4906-9BAE-4F79EB530F1F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*" ,
"versionEndExcluding" : "7.5.9" ,
"matchCriteriaId" : "C4F63447-CA0E-43FC-8FF1-B4032D21E32A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*" ,
"versionStartIncluding" : "8.0.1.21160" ,
"versionEndExcluding" : "8.1.5" ,
"matchCriteriaId" : "D0FC45E7-C4AB-4AC5-87AB-0ED1508CCFF3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.6.0" ,
"matchCriteriaId" : "07BFC8FC-6CF0-49DA-B4ED-5B7936A4233E"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "0.103.7" ,
"matchCriteriaId" : "BDF08008-9C84-4075-8AB7-233209E4F3C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "0.104.0" ,
"versionEndIncluding" : "0.105.1" ,
"matchCriteriaId" : "14FA7424-A3E5-4F46-83F8-E9767330F1CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "A381BD3C-88E0-41FD-91E6-26BCF78B84CA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*" ,
"matchCriteriaId" : "88BE0B1C-4515-40EA-ADDD-A04BF50743DA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB00FEFE-F8A2-482D-A7EE-002DA4E10FF6"
}
]
}
]
2023-07-19 02:01:21 +00:00
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.0.0" ,
"versionEndExcluding" : "3.7.35" ,
"matchCriteriaId" : "88CF061E-FFD8-48DE-887F-2119C916E2B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "3.8.0" ,
"versionEndExcluding" : "3.11.23" ,
"matchCriteriaId" : "F499B698-4EB6-4262-BAF4-9BDE7F114805"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.3.0" ,
"versionEndExcluding" : "4.3.17" ,
"matchCriteriaId" : "40519377-ECDC-41E2-B6A6-7F601AC28ACD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.4.0" ,
"versionEndExcluding" : "4.6.4" ,
"matchCriteriaId" : "77BAC9BA-B215-490F-9202-617B1B4E7C8A"
}
]
}
]
2023-04-24 12:24:31 +02:00
}
] ,
"references" : [
{
"url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-xxe-TcSZduhN" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-xxe-TcSZduhN" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}