CVE-2021-1386 (CNNVD-202104-439)
中文标题:
ClamAV 代码问题漏洞
英文标题:
Cisco Advanced Malware Protection for Endpoints Windows Connector, ClamAV for Windows, and Immunet DLL Hijacking Vulnerability
漏洞描述
中文描述:
ClamAV(Clam AntiVirus)是Clamav团队的一套免费且开源的杀毒软件。该软件用于检测木马、病毒、恶意软件和其他恶意威胁。 ClamAV Windows 存在代码问题漏洞,攻击者可利用该漏洞可以创建一个恶意的DLL,以执行代码。
英文描述:
A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco AMP for Endpoints | n/a | - | - |
cpe:2.3:a:cisco:cisco_amp_for_endpoints:n_a:*:*:*:*:*:*:*
|
| cisco | advanced_malware_protection_for_endpoints | * | - | - |
cpe:2.3:a:cisco:advanced_malware_protection_for_endpoints:*:*:*:*:*:windows:*:*
|
| cisco | clamav | * | - | - |
cpe:2.3:a:cisco:clamav:*:*:*:*:*:windows:*:*
|
| cisco | immunet | * | - | - |
cpe:2.3:a:cisco:immunet:*:*:*:*:*:windows:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-1386 |
2025-11-11 15:20:45 | 2025-11-11 07:36:33 |
| NVD | nvd_CVE-2021-1386 |
2025-11-11 14:57:35 | 2025-11-11 07:44:55 |
| CNNVD | cnnvd_CNNVD-202104-439 |
2025-11-11 15:10:36 | 2025-11-11 07:56:42 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-202104-439
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 4
- data_sources: ['cve'] -> ['cve', 'nvd']