A newly disclosed high-severity vulnerability in WinZip, tracked as CVE-2025-1240, enables remote attackers to execute arbitrary code on affected systems by exploiting malformed 7Z archive files.
The flaw, rated 7.8 on the CVSS scale, impacts WinZip 28.0 (Build 16022) and earlier versions, requiring users to update to WinZip 29.0 to mitigate risks.
The vulnerability arises from inadequate validation of 7Z file data during parsing, permitting attackers to create malicious archives that cause an out-of-bounds write in memory.
This corruption can be leveraged to execute code within the context of the WinZip process, potentially enabling full system compromise if paired with additional exploits.
Security firm Zero Day Initiative (ZDI) detailed the flaw as ZDI-CAN-24986, noting its potential for widespread abuse given WinZip’s global user base.
Successful exploitation grants attackers the same privileges as the logged-in user. This could lead to:
While the attack requires user interaction, the prevalence of 7Z files in software distribution and data sharing increases the likelihood of successful phishing campaigns.
WinZip Computing addressed the flaw in version 29.0 (Build 16250), released in December 2024. The update also introduced enhanced security measures, including:
This vulnerability follows a surge in file-parsing exploits, including a recent Windows OLE zero-click flaw (CVE-2025-21298) that allowed RCE via malicious emails. Such incidents underscore the importance of proactive patch management, particularly for widely used utilities like WinZip, which handles over 1 billion compressed files annually.
Security analysts urge organizations to prioritize updating affected software and educate users on recognizing suspicious file attachments.
WinZip’s prompt response to CVE-2025-1240 highlights the critical role of vendor accountability in cybersecurity. Users and enterprises are advised to apply updates swiftly to neutralize this high-risk threat.
PCI DSS 4.0 & Supply Chain Attack Prevention – Free Webinar
Cary, NC, March 24th, 2025, CyberNewsWire INE Security, a global provider of cybersecurity training and…
A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing…
A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails…
INTERPOL led a multi-national law enforcement operation dubbed "Operation Red Card," which has resulted in…
A novel attack vector combining browser cache exploitation and DLL proxying has emerged as a…
A groundbreaking security tool has emerged in the ongoing battle against sophisticated Linux malware. A…