First published: Sun Jan 19 2025(Updated: )
This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user.
Affected Software | Affected Version | How to fix |
---|---|---|
ZTE ZXR10 9908 | ||
ZTE ZXR10 9908 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-25456 is significant, as it allows remote attackers to bypass important security mechanisms.
To fix ZDI-CAN-25456, ensure you have the latest version of 7-Zip installed, which includes patches for known vulnerabilities.
ZDI-CAN-25456 can lead to attacks where a user is tricked into visiting a malicious page or opening a harmful file.
Yes, user interaction is required to exploit ZDI-CAN-25456, as the target must open a malicious file or visit a malicious webpage.
ZDI-CAN-25456 affects all installations of 7-Zip that have not been updated with the latest security patches.