Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New Tetra Radio Encryption Flaws Expose Law Enforcement Communications

Researchers find surges in exploits on Erlang/OTP SSH RCE and 70% target OT firewall

Nvidia announces infrastructure for use in new Cosmos World Models, Robotics and Physical

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Winrar Zero Day under Active Exploitation – Latest Version Update
Identity

Winrar Zero Day under Active Exploitation – Latest Version Update

userBy userAugust 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 11, 2025Ravi LakshmananZero Day/Vulnerability

The Winrar File Archive Utility maintainer has released an update to address the actively exploited zero-day vulnerability.

Tracked as CVE-2025-8088 (CVSS score: 8.8), this issue is described as a case of past traversal affecting the Windows version of tools that can be exploited to create malicious archive files and obtain arbitrary code execution.

“When extracting files, previous versions of Winrar, RAR, Unrar, Portable Unrar, and Windows versions of dll.dll will trick you using paths defined in a specially created archive instead of the specified path,” Winrar said in its advisory.

Anton Cherepanov, Peter Kosinar, and Peter Strycek of ESET have been admitted for discovering and reporting security flaws addressed in Winrar version 7.13, released on July 31, 2025.

Cybersecurity

Currently, we don’t know how vulnerabilities are weaponized in real-world attacks. In 2023, another vulnerability affecting WINRAR (CVE-2023-38831, CVSS score: 7.8) was subjected to intense exploitation, including zero-days, by multiple threat actors in China and Russia.

Russian cybersecurity vendor Bi.Zone said in a report released last week there were indications that the hacking group tracked as Paper Werewolf (aka Goffee) may have revered alongside CVE-2025-6218 along with CVE-2025-8088, along with CVE-2025-6218, the window version of the window version of CVE-2025-6218.

Before these attacks, it is important to note that the ads were discovered on July 7, 2025 by threat actors identified as “Zeroplayer.” It is suspected that the paper werewolf actor acquired it and used it in the attack.

“In previous versions of Winrar, as well as portable Unrar source code for rar, urrar, urrar.dll, and Windows, you can use specially written archives containing arbitrary code during extraction to manipulate file paths during extraction.”

“To exploit this vulnerability, user interaction is required and files could be written outside the intended directory. This flaw could be exploited to place files in sensitive locations, such as Windows startup folders.

Attacks per Bi.zone targeted Russian organizations in July 2025, triggering CVE-2025-6218 at launch, triggering CVE-2025-80888, writing files outside the target directory, achieving code execution, but the Dicoy document is presented as a victim.

Identity Security Risk Assessment

“The vulnerability relates to the fact that when you create a RAR archive, you can include files containing alternate data streams. The name contains relative paths.” “These streams can contain any payload. If you unpack such an archive, or open attachments directly from the archive, the data from the alternate stream will be written to any directory on disk. This is a directory traversal attack.”

“The vulnerability affects Winrar versions up to 7.12. Starting with version 7.13, this vulnerability is no longer reproduced.”

One of the malicious payloads in question is a .NET loader designed to send system information to an external server and receive additional malware containing encrypted .NET assemblies.

“Paper Werewolf uses a C# loader to retrieve the victim’s computer name and send it to the link to the server with the generated link to get the payload,” the company added. “Paper Werewolf uses reverse shell sockets to communicate with the control server.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAutomaker web portal security flaws
Next Article Genesis Project: Rethinking sustainable microchip production
user
  • Website

Related Posts

New Tetra Radio Encryption Flaws Expose Law Enforcement Communications

August 11, 2025

Researchers find surges in exploits on Erlang/OTP SSH RCE and 70% target OT firewall

August 11, 2025

BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More

August 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Tetra Radio Encryption Flaws Expose Law Enforcement Communications

Researchers find surges in exploits on Erlang/OTP SSH RCE and 70% target OT firewall

Nvidia announces infrastructure for use in new Cosmos World Models, Robotics and Physical

Elon Musk confirms the closure of Tesla Dojo, an “evolutionary dead end”

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Web 3.0 Gets Personal: FySelf’s TwinH Paves the Way for User-Controlled Digital Identity

Google’s Genie 3: The Dawn of General AI?

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.