Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
A significant security vulnerability has been resolved in WinRAR v6.22, a widely-used Windows utility for archiving files. Tracked as CVE-2023-40477, this flaw could potentially allow remote attackers to execute arbitrary code on a victim’s system by simply opening a specially crafted RAR file.
A researcher reported this vulnerability on June 8th, 2023. The issue is rooted in the processing of recovery volumes, where inadequate validation of user data leads to memory access beyond allocated buffers.
In terms of severity, the vulnerability holds a CVSS rating of 7.8. While its rating is slightly reduced due to the requirement of user engagement in opening the compromised archive, convincing users to perform this action is not necessarily difficult. Given the substantial user base of WinRAR, malicious actors could find numerous opportunities for successful exploitation.
The immediate mitigation strategy involves the release of a new version of WinRAR that effectively addresses the vulnerability on August 2nd, 2023. This update not only fixes the vulnerability related to recovery volumes processing code but also addresses another high-severity issue tied to incorrectly initiated files within specially crafted archives.
It’s noteworthy that an upcoming operating system version is embracing native support for similar file formats. This move may diminish the need for third-party software like WinRAR, except in cases where advanced functionalities are required. For users still reliant on WinRAR, proactive steps involve regular updates to the software. A history of similar vulnerabilities being exploited by hackers underscores the importance of maintaining security-conscious behaviors, such as prudent selection of files to open and utilizing antivirus tools capable of scanning content.