Urgent Manual Update! WinRAR Vulnerability Exposed: Used to Silently Install Malware

August 10th, Kuai Technology reports that a critical vulnerability, tracked as CVE-2025-8088, has been addressed in the latest release of WinRAR, version 7.13. This update comes in response to active exploitation of the flaw, discovered by ESET researchers.

The vulnerability resides within the core library, UNRAR.dll, responsible for archive decompression. Attackers can craft malicious archives that trick the software into writing files to locations outside of the user’s intended directory during the extraction process. This is a significant risk as it bypasses user consent for file placement.

ESET’s findings indicate that attackers exploited this vulnerability to place malware in sensitive system locations, such as the Startup folder. By strategically placing executable files within the path “%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup,” malicious code is designed to execute automatically upon user login. This effectively grants attackers remote code execution capabilities on compromised machines, allowing them to control the affected system without further user interaction.

The attacks are attributed to the RomCom group, which has been active since at least 2022. The RomCom malware itself is a Remote Access Trojan (RAT). Its modus operandi involves social engineering tactics to deceive users. The group often impersonates websites of popular software. When unsuspecting users download and install these disguised installers, the RAT is covertly installed along with it, making the exploitation chain particularly insidious.

It is crucial for all WinRAR users to take immediate action. To ensure protection against this vulnerability, users need to manually visit the official WinRAR website and install version 7.13. According to WinRAR developers, the Unix versions of RAR and UnRAR, as well as the Android version of RAR, are not affected by this particular vulnerability. This distinction highlights the targeted nature of the exploitation and the importance of platform-specific security updates.

Hurry to Update Manually! WinRAR Vulnerability Exposed: Exploited to Stealthily Install Malware

免责声明:本网站内容主要来自原创、合作伙伴供稿和第三方自媒体作者投稿,凡在本网站出现的信息,均仅供参考。本网站将尽力确保所提供信息的准确性及可靠性,但不保证有关资料的准确性及可靠性,读者在使用前请进一步核实,并对任何自主决定的行为负责。本网站对有关资料所引致的错误、不确或遗漏,概不负任何法律责任。任何单位或个人认为本网站中的网页或链接内容可能涉嫌侵犯其知识产权或存在不实内容时,可联系本站进行审核删除。
(0)
上一篇 2025年 8月 10日 下午10:35
下一篇 2025年 8月 11日 上午1:05

相关推荐

欢迎来到AI快讯网,开启AI资讯新时代!