Windows libarchive Remote Code Execution Vulnerability

CVE-2024-20697
7.3HIGH

Key Information

Vendor
Microsoft
Status
Windows 11 Version 22h2
Windows 11 Version 22h3
Windows 11 Version 23h2
Windows Server 2022, 23h2 Edition (server Core Installation)
Vendor
CVE Published:
9 January 2024

Badges

👾 Exploit Exists📰 News Worthy

Summary

CVE-2024-20697 is a critical vulnerability in Microsoft Windows that allows for remote code execution due to an integer overflow vulnerability in the Libarchive library. The vulnerability arises from insufficient bounds checks on the block length of a RARVM filter used for Intel E8 preprocessing in a RAR archive. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code in the context of the application using the vulnerable library. Microsoft has released a patch to address this vulnerability, and organizations are advised to apply the patch and implement detection measures to protect against potential exploitation. No known ransomware groups have exploited this vulnerability in the wild.

Affected Version(s)

Windows 11 version 22H2 < 10.0.22621.3007

Windows 11 version 22H3 < 10.0.22631.3007

Windows 11 Version 23H2 < 10.0.22631.3007

News Articles

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • First article discovered by Zero Day Initiative

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre DatabaseMicrosoft Feed1 News Article(s)
.