⚡ TL;DR | Go Straight to the WinRAR Vulnerability Audit Report
A high-security security RCE vulnerability in WinRAR has been fixed in WinRAR 6.23 released earlier this month. If successfully exploited, the vulnerability could lead to remote code execution. This could in turn lead to privilege escalation, data theft, denial of service, and more. We have added a new report to Lansweeper to help you locate vulnerable devices.
WinRAR Vulnerability CVE-2023-40477
The vulnerability tracked as CVE-2023-40477 is a case of improper validation while processing recovery volumes. It received a CVSS score of 7.8 An attacker could use this flaw to execute arbitrary code by tricking its targets into visiting maliciously crafted web pages or opening a malicious file. Arbitrary code execution attacks can compromise the integrity of sensitive data and files. You can read more about this vulnerability in this advisory from the Zero Day Initiative.
Update Vulnerable WinRAR Installations
The Zero Day Initiative reported the issue to RARLAB on the 8th of June. The issue was addressed in the WinRAR 6.23 release on August 2nd, along with 3 other issues. In order to protect yourself against potential threats, make sure to update any WinRAR installations to the latest version.
Discover Vulnerable WinRAR Installs
We have added a new report to Lansweeper to help you locate any WinRAR installations in your network that still need to be updated to version 6.23 or higher. This way you have an actionable list of devices that still need your intervention. You can get the report via the link below.