The extensively used file compression instrument for Home windows, WinRAR, has simply launched model 7.13 to tackle a extreme safety vulnerability recognized as CVE-2025-8088. This flaw, discovered by ESET security researchers, particularly impacts the Home windows model of WinRAR, concentrating on the UNRAR.dll library. The vulnerability permits attackers to craft malicious archive information that, when extracted by a consumer, trick WinRAR into writing information to a location of the attacker’s selecting as a substitute of the listing chosen by the consumer.
Exploitation of this vulnerability has been noticed within the wild, notably via phishing campaigns. Attackers have despatched emails containing specifically designed RAR archives that, when extracted, deposit executable information into delicate Home windows folders such because the Startup folder (%APPDATApercentMicrosoftWindowsStart MenuProgramsStartup). Any bug positioned right here is robotically executed the following time the system begins, leading to full compromise of the affected machine. This methodology allows attackers to realize persistent entry and doubtlessly execute additional malicious actions, together with putting in distant entry trojans (RATs).
The first malware linked to exploitation of this flaw known as RomCom, a Distant Entry Trojan (RAT) related to cybercriminals recognized for social engineering assaults. These attackers disguise their malware as official functions, encouraging customers to obtain and set up compromised WinRAR variations. RomCom has been noticed concentrating on organizations in numerous sectors, and there may be proof connecting its exploitation of CVE-2025-8088 to Russian-linked teams. Earlier assaults enabled distant code execution, knowledge exfiltration, and deployment of additional malware payloads.
You will need to notice that Unix variations of RAR and UnRAR, together with the variations for Android, are usually not affected by this vulnerability. The safety subject is confined to Home windows customers, and solely these with the affected variations (previous to 7.13) are in danger.
Not like some trendy software program, WinRAR doesn’t characteristic automated updates. Customers should go to the official WinRAR website and manually obtain and set up the newest model to be protected. Failure to improve leaves techniques uncovered to lively threats.
Filed in . Learn extra about Security, Windows 10 and Windows 11.
Trending Merchandise
SAMSUNG FT45 Sequence 24-Inch FHD 1...
ASUS RT-AX1800S Dual Band WiFi 6 Ex...
