NG Solution Team
Technology

Has WinRAR fixed the zero-day flaw exploited by RomCom?

The widely used file archiving tool, WinRAR, recently faced a critical zero-day vulnerability that exposed systems to potential code execution attacks. Although WinRAR has now resolved this issue, the vulnerability was actively exploited to distribute RomCom malware through maliciously crafted archive files.

Security experts identified the flaw, labeled CVE-2025-8088, as a path traversal vulnerability affecting WinRAR for Windows. With a high severity rating and a CVSS score of 8.4, the vulnerability allowed attackers to manipulate the extraction path of files from specially crafted archives, overriding user-specified paths. Notably, this issue did not affect RAR versions for Unix or Android.

The RomCom group, a known Russian cyber-espionage entity, exploited this vulnerability to conduct spearphishing attacks, sending malicious RAR files via email. This group has previously been in the spotlight for exploiting multiple zero-day vulnerabilities, including a notable attack during the NATO Summit in 2023.

In response to the threat, WinRAR released version 7.13, which includes a fix for the vulnerability along with other improvements. Users are urged to update their systems promptly to mitigate risks. Additionally, organizations are advised to maintain vigilance against phishing attempts and conduct regular training to bolster cybersecurity awareness among employees.

Related posts

Was Noble’s X Account Hack a Wake-Up Call for Crypto Traders?

David Jones

Is China advancing its AI ambitions at the World AI Conference?

David Jones

Is Meroka Reviving Humanity in Healthcare with a $6M Seed Round?

Emily Brown

Leave a Comment

This website uses cookies to improve your experience. We assume you agree, but you can opt out if you wish. Accept More Info

Privacy & Cookies Policy