7-zip vulnerability gives hackers the keys to the kingdom

App is yet to be patched, so be on your guard

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

A threat actor could abuse the populararchiving app, 7-zip and gain elevated privileges on a device to which they already have access.

A GitHub user going by the name Kagancapar discovered a zero-day vulnerability in 7-zip for the Windowsoperating system(OS). The findings, posted on GitHub, revealed that, “Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.”

Here’s how it works: a threat actor crafts a malicious file, and gives it a .7z extension (the one that an archive compressed with 7-zip can have). They then need to drag and drop that file onto the 7-zip help window, and run a command in admin mode.

Share your thoughts on Cybersecurity and get a free copy of the Hacker’s Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at theend of this surveyto get the bookazine, worth $10.99/£10.99.

Waiting for a patch

Waiting for a patch

After that, they’ll get elevated privileges on the target endpoint, allowing them to run more complex commands and run different apps. More details can be found in thisproof-of-concept video.

The vulnerability is now tracked as CVE-2022-29072. The latest 7-zip version is 21.07, released in late December last year, which means the zero-day was not yet patched.

Those worried about potentially being targeted through 7-zip can protect their virtual premises by deleting the 7-zip.chm file,Tom’s Hardwarereported. Another method is to grant 7-zip only read and run permissions for all users.

7-Zip review>Download 7-Zip: 5 reasons why it surpasses the Windows zipper-upper>Best free WinZip alternative 2022: compress and extract file archives

Thefile compressioncompany doesn’t seem to have commented on the vulnerability much, other than refusing to take responsibility for the flaw, given that it depends onMicrosoftHelp in Windows. However, as Kagancapar explained, dropping the malicious file on the Help window triggers a heap overflow in 7zFM.exe, which leads to the escalation of privilege, arguing that for this reason alone - it’s 7-zip who should be addressing the issue.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

7-zip is one of the three most popularfilearchiving applications, whose popularity is only rivaled by giants WinZIP and WinRaR.

Via:Tom’s Hardware

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Cisco issues patch to fix serious flaw allowing possible industrial systems takeover

Washington state court systems taken offline following cyberattack

Your doctor may have an AI assistant taking notes during your next Zoom call