CVE-2023-20212

7.5 HIGH

📋 TL;DR

A memory management logic error in ClamAV's AutoIt module allows remote attackers to cause denial of service by submitting crafted AutoIt files. This affects systems running vulnerable versions of ClamAV antivirus software, potentially disrupting scanning services.

💻 Affected Systems

Products:
  • ClamAV
Versions: Versions prior to 1.0.4, 1.2.2, and 1.3.0
Operating Systems: All platforms running ClamAV
Default Config Vulnerable: ⚠️ Yes
Notes: Any ClamAV installation with AutoIt scanning enabled (default) is vulnerable when processing AutoIt files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Continuous exploitation could cause persistent DoS, preventing ClamAV from scanning files and potentially allowing malware to bypass detection during downtime.

🟠

Likely Case

Intermittent scanning process restarts causing temporary service disruption and potential scanning gaps.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH - ClamAV often processes files from external sources (email attachments, downloads), making internet-facing instances prime targets.
🏢 Internal Only: MEDIUM - Internal systems could be targeted through malicious internal traffic or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires submitting a crafted AutoIt file to ClamAV for scanning, which can be done remotely without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4, 1.2.2, or 1.3.0

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-dos-FTkhqMWZ

Restart Required: Yes

Instructions:

1. Download latest ClamAV version from official sources. 2. Stop ClamAV service. 3. Install updated version. 4. Restart ClamAV service. 5. Verify version with 'clamscan --version'.

🔧 Temporary Workarounds

Disable AutoIt scanning

all

Temporarily disable AutoIt file scanning in ClamAV configuration

Edit clamd.conf: add 'ScanAutoIt no'
Edit freshclam.conf: ensure AutoIt updates disabled

Network filtering

linux

Block AutoIt files at network perimeter before they reach ClamAV

iptables -A INPUT -m string --string "AutoIt" --algo bm -j DROP
Configure email/web gateways to block .au3 files

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to ClamAV services
  • Deploy monitoring and alerting for ClamAV process restarts and unusual scanning patterns

🔍 How to Verify

Check if Vulnerable:

Run 'clamscan --version' and check if version is below 1.0.4, 1.2.2, or 1.3.0

Check Version:

clamscan --version

Verify Fix Applied:

Confirm version is 1.0.4, 1.2.2, or 1.3.0+ with 'clamscan --version' and test scanning AutoIt files

📡 Detection & Monitoring

Log Indicators:

  • ClamAV process restarts in system logs
  • Error messages related to AutoIt parsing in ClamAV logs
  • Increased scanning failures for AutoIt files

Network Indicators:

  • Unusual volume of AutoIt file transfers to systems running ClamAV
  • Multiple scanning requests for AutoIt files from single sources

SIEM Query:

source="clamav" AND ("process restart" OR "AutoIt" OR "segmentation fault")

🔗 References

📤 Share & Export