Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
Trustwave and Cybereason Merge to Form Global MDR Powerhouse for Unparalleled Cybersecurity Value. Learn More
On November 20th, 2024, Zero Day Initiative (ZDI) researchers disclosed a critical flaw in 7-Zip.
This widely used open-source file archiving software enables remote actors to perform remote code execution (RCE) on vulnerable 7-Zip versions. This vulnerability was originally discovered earlier this year and was reported to 7-Zip in June 2024.
Tagged as CVE-2024-11477, this vulnerability exists within the implementation of Zstandard decompression, specifically affecting 7-Zip’s Zstandard decompression library. The issue comes from the inadequate validation of user-supplied data during the decompression process, which can cause an integer underflow. When this occurs, threat actors can execute arbitrary code within the affected process.
It should be noted that although user interaction is required to exploit this vulnerability, attack vectors can vary depending on 7-Zip’s implementation within a system.
Despite CVE-2024-11477 having a CVSS score of 7.8 and a high severity rating, it’s important to note that there are no active exploitations of this vulnerability in the wild as of this writing. However, we found that a malicious actor had uploaded a link to a fake proof-of-concept (PoC) file of the 7-Zip flaw on GitHub, leading to a phishing landing page.
The URL was flagged as malicious on VirusTotal.
It’s important to remember that malicious email campaigns often rely on compressed attachments to spread malware. If an exploit is developed to weaponize this vulnerability you can expect to see activity around CVE-2024-11477 increase tremendously.
To mitigate this risk, users and organizations are strongly advised to update to 7-Zip version 24.07 or later immediately. Users are also reminded to remain vigilant when opening archive files, especially if they come from untrusted sources.
Pauline Bolaños is a Security Content Researcher at Trustwave SpiderLabs. Pauline has seven years of experience as a cybersecurity writer, covering diverse security topics including malware, vulnerabilities, AI, and the cloud. Follow Pauline on LinkedIn.
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2024 Trustwave Holdings, Inc. All rights reserved.