⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.. Due date: 2023-09-14.
CVE-2023-38831 — Insufficient Verification of Data Authenticity in Winrar
Severity
7.8HIGHNVD
EPSS
93.9%
top 0.13%
CISA KEV
KEVRansomware
Added 2023-08-24
Due 2023-09-14
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedAug 23
KEV addedAug 24
KEV dueSep 14
Latest updateMay 7
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages1 packages
🔴Vulnerability Details
4💥Exploits & PoCs
2📋Vendor Advisories
2🕵️Threat Intelligence
9Bleepingcomputer
▶