Home » Technology » 7-Zip Vulnerability Exposed: Bypasses Windows Security to Execute Malicious Code | Mobile Daily

7-Zip Vulnerability Exposed: Bypasses Windows Security to Execute Malicious Code | Mobile Daily

High-Risk Vulnerability in 7-Zip Exposes‌ Users to Arbitrary code Execution: What You Need to Know

The popular ‍file ⁣compression tool⁤ 7-Zip has been hit by a critical security vulnerability, CVE-2025-0411, which allows​ attackers to bypass Windows’ mark of the Web (MotW) security mechanism. This flaw enables malicious actors ‍to execute arbitrary code when users extract specially ​crafted archive files. The vulnerability, discovered by Peter Girnus of the Trend Micro Zero Day Initiative, has ⁢been ⁤addressed in 7-Zip version 24.09, released‍ on⁤ November 30, ​2024. Though, ⁢users are urged ⁤to update immediately to avoid potential exploitation.

How Does the MotW Mechanism Protect Users?⁢

Introduced in 7-Zip⁤ version 22.00 in June 2022, the⁢ Mark of the Web feature ​is‌ designed to safeguard users by tagging files downloaded⁢ from untrusted sources with a special ⁣ Zone.Id data stream.This mechanism serves ⁣two critical purposes:‌

  • It displays security warnings ⁢ when users ⁤attempt to open⁢ risky‌ files. ​
  • It forces Microsoft Office into Protected View mode, disabling macros and enabling read-only access to prevent malicious ‌code execution.

However,the CVE-2025-0411 vulnerability​ undermines this‌ protection ⁢by​ failing to⁤ pass the MotW tag to​ extracted files in nested archives. This oversight allows attackers to⁢ bypass​ security warnings, leaving users⁤ vulnerable to code execution attacks. ​

exploitation and Risks ‍

According to ⁢ Trend Micro,⁢ the vulnerability lies in 7-Zip’s handling of ⁢nested compressed ‌files.‍ When a malicious⁤ archive containing ​an motw ⁣tag is extracted, ⁢the tag is not transferred to the extracted files, rendering the security mechanism ineffective. ‍Attackers can exploit this flaw by ‌tricking users into opening⁤ malicious files or ‍visiting​ compromised websites. ​

“This vulnerability requires user interaction to be exploited,⁣ such ‌as visiting a ⁢malicious ⁣page or ⁣opening a malicious file,” Trend ⁢Micro stated. this means that while the flaw ​is severe, it relies⁣ on⁢ social engineering tactics ​to succeed. ⁢

Patches and ‍Immediate Action ‍

Igor​ Pavlov, the developer of 7-Zip, has resolved the issue in version 24.09. ‍In a statement,Pavlov‌ explained,”7-Zip file manager ⁢failed to pass the Zone.Identifier data stream for files extracted from ⁢nested archives.” ⁤

As 7-Zip does not ⁣support automatic updates, many users may ​still be running older, vulnerable versions.​ Cybersecurity experts strongly recommend upgrading to the ⁣latest version immediately to mitigate the risk of exploitation. ​

A history of MotW exploits

This is ‌not the first time MotW ‌vulnerabilities have ⁤been ‌exploited. In June 2024, Microsoft addressed CVE-2024-38213, which was ‍used ⁢by the ⁣ DarkGate malware ‌to bypass SmartScreen protection.the malware disguised itself as legitimate​ software like⁣ Apple iTunes or‍ NVIDIA installers. similarly, the financial hacking group Water Hydra ⁣ leveraged CVE-2024-21412 to target stock trading and foreign exchange forums. ‍

Key ​Takeaways

| Aspect ⁢ ​ | Details ‍ ​ ⁢ ‍ ⁣ ⁣ ⁢ ‌ ⁣ ⁤​ ‌ ⁣ ⁤ |
|————————–|—————————————————————————–|
| ⁣ Vulnerability ‌ ⁢ ⁣‍ | CVE-2025-0411 ⁤ ‌ ‍ ​ ‌ ​ ⁣ |
| Affected Software ‌ | 7-Zip versions prior ⁢to 24.09 ‌ ⁤ ‍ ‌ ⁣⁣ ​ ‍ ⁣⁤ ⁢ ⁣ |
| Risk ​ ⁣ ⁢ | Arbitrary code execution via malicious archive files ⁣ |
| Patch Release Date ⁤ | ​November 30, 2024 ⁢ ⁢ ‍ ‌ ⁣ ​ |
| Update Suggestion | Upgrade to 7-Zip version 24.09⁢ immediately​ ‍ ‌ ⁣ ‍ ​ |

Stay Protected​

The discovery of ‌ CVE-2025-0411 underscores the importance of keeping software up to date. Users⁣ shoudl manually download and install the latest version of 7-Zip from the official website to ensure their systems are secure.

For more data on cybersecurity threats and updates,visit the Cyber Security Agency ⁤of Singapore [[1]] or‍ explore detailed reports on CVE-2025-0411 [[2]].

Don’t wait—update ⁤your ⁢software today to protect your data and devices from ‌potential attacks.

Critical⁢ Vulnerability ​in 7-Zip: are Users at Risk?

With the recent revelation of a high-risk vulnerability in the ‌popular file compression tool 7-Zip, the ‍question on everyone’s mind is: Are users at risk? Today, we have with​ us Dr. Emily Hart, a distinguished cybersecurity specialist, to discuss this critical issue, the vulnerability known as CVE-2025-0411, and what users need to know to protect ⁣themselves.

What is the Mark of the Web (MotW) mechanism and how does it protect ⁢users?

Dr. Emily Hart: The Mark of the⁢ Web (MotW) is a feature introduced in 7-Zip​ version 22.00 to safeguard users from potentially‌ hazardous files. It effectively works by tagging files ⁤downloaded from untrusted sources with a special‍ Zone.Id data stream. This mechanism serves two crucial purposes.first, it displays security warnings when users attempt to open risky⁣ files. Second, it forces ​Microsoft Office into Protected View mode, disabling macros and enabling read-only access to prevent malicious code execution.

How does the CVE-2025-0411​ vulnerability undermine this protection?

Dr. Emily Hart: The vulnerability, discovered by Peter Girnus of Trend Micro’s ‍Zero Day Initiative, lies in 7-Zip’s handling ‌of⁢ nested compressed files.When a​ malicious archive ⁣containing an MotW tag is extracted, the ⁣tag is not ​transferred to the extracted files, making the security mechanism ineffective.This oversight allows attackers to bypass security warnings, leaving‌ users vulnerable to ​code execution attacks.

How can this vulnerability be exploited, and what are the risks to users?

Dr. Emily Hart: This vulnerability⁢ requires user interaction to be exploited. attackers can trick users into opening malicious files or visiting compromised websites.If a user extracts a‌ malicious archive containing ‍a nested​ compressed file with an MotW tag, the tag will not be transferred, ⁢knihaz.so bypassing the security​ warning and enabling ⁣the execution of arbitrary code.

What can users do to protect⁣ themselves from​ this vulnerability?

Dr. Emily Hart: The most important thing users can do is to upgrade to the latest version of 7-Zip,which is​ 24.09. This version ‌includes a patch that resolves the vulnerability. Additionally, users should be cautious when opening compressed⁣ files, especially if they’re from untrusted sources. Keep an⁣ eye ‌out for security warnings and consider disabling the​ extraction of nested archives by default ⁤to‌ better protect against potential attacks.

are there any other known exploits involving the ⁤Mark of the Web mechanism?

Dr. emily Hart: Yes, this is not the first time MotW vulnerabilities⁤ have been exploited. In June 2024,‍ Microsoft addressed CVE-2024-38213, which was used by the DarkGate malware to bypass SmartScreen protection.⁢ The ‍malware disguised itself as legitimate software like Apple iTunes or NVIDIA installers. Similarly, the financial hacking group water Hydra leveraged ⁤CVE-2024-21412 to target stock ⁤trading and foreign exchange forums.

What can we expect from future developments regarding this vulnerability and 7-Zip’s security?

Dr. Emily Hart: Now that this vulnerability has been ​discovered and patched, we can expect attackers to shift their focus ‌to other weaknesses or new vulnerabilities. As an ⁢inevitable result, it’s crucial​ for users‍ to stay vigilant and keep their software up to date. In response,7-Zip’s developer,Igor Pavlov,has shown a ⁤strong commitment to addressing⁤ security issues promptly. We can expect future⁣ versions of 7-Zip to include improved security measures ‍to protect users from potential threats.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.