RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability
CVE-2023-40477

7.8HIGH

Key Information:

Vendor
Rarlab
Status
Vendor
CVE Published:
3 May 2024

Badges

💰 Ransomware👾 Exploit Exists🟣 EPSS 93%📰 News Worthy

Summary

A vulnerability has been identified in RARLAB WinRAR concerning the improper validation of array indices within recovery volume processing. This issue can be exploited by remote attackers who could execute arbitrary code on systems running affected versions of WinRAR. The flaw arises from insufficient validation of user-supplied data, leading to potential memory access beyond allocated buffers. Attackers can exploit this vulnerability when users visit a malicious website or open a crafted archive. Users of WinRAR are advised to be cautious and avoid opening untrusted files or links.

Affected Version(s)

WinRAR 6.21

News Articles

Fake WinRAR PoC spread VenomRAT malware - Help Net Security

An threat actor has released a fake PoC exploit for a recently fixed RCE vulnerability in WinRAR to spread the VenomRAT malware.

WinRAR vulnerable to remote code execution, patch now! (CVE-2023-40477) - Help Net Security

RARLAB has fixed a high-severity RCE vulnerability (CVE-2023-40477) in WinRAR, a widely used file archiver for Windows.

References

EPSS Score

93% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by Help Net Security

  • Vulnerability Reserved

.