The broadly used file compression device for Home windows, WinRAR, has simply launched model 7.13 to tackle a extreme safety vulnerability recognized as CVE-2025-8088. This flaw, discovered by ESET security researchers, particularly impacts the Home windows model of WinRAR, concentrating on the UNRAR.dll library. The vulnerability permits attackers to craft malicious archive recordsdata that, when extracted by a person, trick WinRAR into writing recordsdata to a location of the attacker’s selecting as a substitute of the listing chosen by the person.
Exploitation of this vulnerability has been noticed within the wild, notably by means of phishing campaigns. Attackers have despatched emails containing specifically designed RAR archives that, when extracted, deposit executable recordsdata into delicate Home windows folders such because the Startup folder (%APPDATApercentMicrosoftWindowsStart MenuProgramsStartup). Any trojan horse positioned right here is routinely executed the following time the system begins, leading to full compromise of the affected machine. This methodology permits attackers to achieve persistent entry and doubtlessly execute additional malicious actions, together with putting in distant entry trojans (RATs).
The first malware linked to exploitation of this flaw is known as RomCom, a Distant Entry Trojan (RAT) related to cybercriminals identified for social engineering assaults. These attackers disguise their malware as reputable purposes, encouraging customers to obtain and set up compromised WinRAR variations. RomCom has been noticed concentrating on organizations in numerous sectors, and there may be proof connecting its exploitation of CVE-2025-8088 to Russian-linked teams. Earlier assaults enabled distant code execution, knowledge exfiltration, and deployment of additional malware payloads.
It is very important be aware that Unix variations of RAR and UnRAR, together with the variations for Android, usually are not affected by this vulnerability. The safety difficulty is confined to Home windows customers, and solely these with the affected variations (previous to 7.13) are in danger.
In contrast to some trendy software program, WinRAR doesn’t characteristic automated updates. Customers should go to the official WinRAR website and manually obtain and set up the newest model to be protected. Failure to improve leaves methods uncovered to lively threats.
Filed in . Learn extra about Security, Windows 10 and Windows 11.
Trending Merchandise
Nimo 15.6 FHD Pupil Laptop computer, 16GB RAM...
Logitech MK540 Superior Wi-fi Keyboard and Mo...
Gaming Keyboard and Mouse Combo, K1 RGB LED B...
ASUS 22” (21.45” viewable) 1080P Eye Care...
