However, the company noted that the overall system stability remains intact despite the successful exploitation of the flaw.
The flaw could shut down AV scanning
The flaw, despite being a medium severity issue, could compromise critical scanning processes for ClamAV users who use it for a range of protection including email scanning, web filtering, and endpoint security.
“An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device,” the advisory added. “The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability.”