Description

A critical zero-day vulnerability has been discovered in the popular file compression utility 7-Zip, reportedly leaked online by a hacker using the handle "NSA_Employee39." The vulnerability, identified by the CVE-2024-11477 designation, appears to allow attackers to run arbitrary code on a victim's system through a malformed.7z archive. The exploit occurs through a buffer overflow from a specially crafted LZMA stream, exploiting a function in the LZMA decoder RC_NORM. If the exploit is exploited successfully, malicious payloads can be run on them, which allows even worse security risks such as data breaches, ransomware, and malware infections. While this sounds so serious, Igor Pavlov, who is the author of 7-Zip, already denied the attack as fake. As one can clearly see, this report about exploitation reveals the problem that exists in vulnerability reporting. Public disclosure of such information without first giving developers a prior notice denies them their ability to issue patches before time. This practice opens the door for immediate exploitation by cybercriminals and thus increases the risks of users and organizations. It increases the danger from Infostealer malware, which might exploit this vulnerability to obtain sensitive information. Additionally, the vulnerability danger of infecting the supply chain operation by injecting malicious payloads into automated workflows increases. The users and organizations are recommended to undertake precautionary measures to avoid such risks. The developers of 7-Zip updates should be followed along with prompt patch application. File sandboxing and scanning mechanisms can help scrutinize the external files before processing. Organizations should also spread awareness among employees about the threat of opening unsolicited or suspicious files. Collaboration within the community of cybersecurity is still imperative to analyze and address threats effectively, and it underlines the point that vigilance is in defense against such exploits.