Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Old WinRAR vulnerability is exploited by government-backed actors
Quote:WinRAR users who have not updated the archiving software in some time may want to do so immediately. A report by Google's Threat Analysis Group TAG suggests that government-backed actors are exploiting a vulnerability in WinRAR for which a fix has been available for some time.

We published information about the WinRAR update that addressed the issue in August when it first came out. WinRAR 6.23 fixed the issue. It allowed malicious actors to run code on devices on successful exploitation of the vulnerability.

All it requires is that users open a specially crafted WinRAR archive on their devices. WinRAR users can patch the issue by downloading and installing the latest version, which is WinRAR 6.24 at the time of writing.

Google's report on the WinRAR vulnerability

[Image: winrar-version.png]

Google discovered that multiple government-backed hacking groups are exploiting the WinRAR's CVE-2023-38831 vulnerability in recent weeks. First exploits of the issue began in early 2023, a time when anti-malware services and the maker of WinRAR were unaware of the vulnerability.

While a patch is available, Google notes that "many users still seem to be vulnerable". In other words: WinRAR users have not updated the archiving software to version 6.23 or newer since the release in August 2023.

Google provides a detailed analysis of the vulnerability in the blog post. It explains that the issue is a "logical vulnerability within WinRAR causing extraneous temporary file expansion when processing crafted archives, combined with a quirk in the implementation of Windows’ ShellExecute when attempting to open a file with an extension containing spaces".

Attackers may exploit the issue to execute arbitrary code on user devices when a "user attempts to view a benign file (such as an ordinary PNG file) within a ZIP archive".

You can check out the full blog post over on Google's blog for additional information about the vulnerability.

Closing Words

WinRAR users should download the latest version of the software from the official website and install it on their devices. This protects them from attacks that target the vulnerability.

Those who run the latest version of Windows 11 and only use WinRAR to extract archives may also consider using the new RAR extract feature of the operating system.
Continue Reading

Forum Jump:

Users browsing this thread: 1 Guest(s)
You have to register before you can post on our site.



Recent Posts
NTEL Arc & Iris Graphics
NTEL Arc & Iri...harlan4096 — 10:23
LibreOffice 7.6.4
LibreOffice 7.6.4:...harlan4096 — 10:19
Microsoft Edge 120.0.2210.61
Microsoft Edge 120...harlan4096 — 10:18
Brave 1.61.101
Release Channel 1....harlan4096 — 10:17
AMD News
AMD Promises To Make...harlan4096 — 10:11

Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (41)ivyhuv
avatar (39)Enlargedterrestrial20

Online Staff
There are no staff members currently online.