• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC

You are here: Home / Cyber Security News / New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC

A high-severity security flaw has been disclosed in the WinRAR utility that could be perhaps exploited by a risk actor to realize remote code execution on Windows methods.

Tracked as CVE-2023-40477 (CVSS score: 7.8), the vulnerability has been described as a situation of incorrect validation when processing recovery volumes.

“The issue outcomes from the absence of appropriate validation of user-equipped data, which can final result in a memory entry earlier the end of an allotted buffer,” the Zero Day Initiative (ZDI) reported in an advisory.

“An attacker can leverage this vulnerability to execute code in the context of the existing approach.”

Profitable exploitation of the flaw calls for consumer interaction in that the target have to be lured into visiting a destructive site or by simply just opening a booby-trapped archive file.

A security researcher, who goes by the alias goodbyeselene, has been credited with discovering and reporting the flaw on June 8, 2023. The issue has been addressed in WinRAR 6.23 released on August 2, 2023.

“A security issue involving out of bounds publish is fixed in RAR4 restoration volumes processing code,” the maintainers of the computer software reported.

The hottest variation also addresses a 2nd issue wherein “WinRAR could start off a completely wrong file just after a user double clicked an merchandise in a specially crafted archive.” Group-IB researcher Andrey Polovinkin has been credited for reporting the challenge.

People are proposed to update to the most current version to mitigate opportunity threats.

Discovered this post exciting? Observe us on Twitter  and LinkedIn to go through much more unique content material we article.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « How to Investigate an OAuth Grant for Suspicious Activity or Overly Permissive Scopes
Next Post: Critical Adobe ColdFusion Flaw Added to CISA’s Exploited Vulnerability Catalog »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor
  • LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
  • Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware
  • Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms
  • Are Forgotten AD Service Accounts Leaving You at Risk?

Copyright © 2025 · AllTech.News, All Rights Reserved.