top of page

Critical 7-Zip Vulnerability CVE-2024-11477

Image for post about CVE-2024-11477 Vulnerability Report

Executive Summary

Date: November 26, 2024

Given the nature of this vulnerability, it is crucial for organizations to remain vigilant as it could be leveraged by various threat actors in the wild. CVE-2024-11477 is a critical vulnerability affecting the popular file compression tool 7-Zip, classified as a Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip.

Technical Information

The vulnerability exists within the implementation of Zstandard decompression, where the lack of proper validation of user-supplied data can lead to an integer underflow before writing to memory. This flaw can be exploited by crafting malicious archive files that, when processed by 7-Zip, can trigger the vulnerability and allow an attacker to execute arbitrary code on the victim's machine. The identifier for this vulnerability is ZDI-CAN-24346.

The Common Vulnerability Scoring System (CVSS) score for this vulnerability is 7.8, indicating a high severity level. The vector string is AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, which denotes that the attack vector is local, requires user interaction, and has a high impact on confidentiality, integrity, and availability. Organizations using 7-Zip should prioritize patching this vulnerability to mitigate potential risks.

Exploitation in the Wild

As of now, there are no confirmed reports of CVE-2024-11477 being actively exploited in the wild. However, the nature of the vulnerability suggests that it could be targeted by attackers who craft malicious archives that exploit the decompression flaw. Organizations are advised to monitor their systems for any unusual activity related to 7-Zip usage. Indicators of Compromise (IOCs) may include unexpected crashes of the application, unusual network traffic patterns, or the presence of unknown files in the system that may be associated with malicious archives.

APT Groups using this vulnerability

While there is no direct attribution to any specific APT groups exploiting CVE-2024-11477, the potential for exploitation exists. Various threat actors may leverage this vulnerability to gain unauthorized access to systems, particularly in sectors that utilize 7-Zip for file compression and decompression. Organizations should remain vigilant and implement monitoring strategies to detect any signs of exploitation.

Affected Product Versions

The following products are affected by CVE-2024-11477: 7-Zip versions prior to 24.07; SUSE Linux Enterprise Desktop 15 SP5, 15 SP6; SUSE Linux Enterprise Server 15 SP5, 15 SP6; openSUSE Leap 15.5, 15.6; SUSE Linux Enterprise High Performance Computing 15 SP5, 15 SP6; SUSE Linux Enterprise Module for Basesystem 15 SP5, 15 SP6; SUSE Manager Proxy 4.3; SUSE Manager Retail Branch Server 4.3; SUSE Manager Server 4.3; SUSE Linux Enterprise Server for SAP Applications 15 SP5, 15 SP6; HPE Helion OpenStack 8; SUSE CaaS Platform 4.0; SUSE Enterprise Storage 6, 7, 7.1; SUSE Linux Enterprise Desktop 12 SP1, 12 SP2, 12 SP3, 12 SP4, 15, 15 SP1, 15 SP2, 15 SP3; SUSE Linux Enterprise Server 12 SP1, 12 SP2, 12 SP3, 12 SP4, 15, 15 SP1, 15 SP2, 15 SP3, 15 SP4; SUSE Manager Proxy 4.0, 4.1, 4.2; SUSE Manager Server 4.0, 4.1, 4.2; SUSE OpenStack Cloud 7, 8, 9; SUSE OpenStack Cloud Crowbar 8, 9; openSUSE Leap 15.3, 15.4. For a complete list of affected products, refer to the SUSE advisory at https://www.suse.com/security/cve/CVE-2024-11477.html.

Workaround and Mitigation

To mitigate the risks associated with CVE-2024-11477, organizations should take the following actions: update to the latest version of 7-Zip (24.07 or later) to ensure that the vulnerability is patched; implement strict file handling policies to avoid opening untrusted or suspicious archive files; monitor network traffic for any unusual patterns that may indicate exploitation attempts. Additionally, organizations should educate their employees about the risks associated with opening files from unknown sources and encourage them to report any suspicious activity.

References

  • National Vulnerability Database (NVD): https://nvd.nist.gov/vuln/detail/CVE-2024-11477
  • Zero Day Initiative Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1532/
  • SUSE Security Advisory: https://www.suse.com/security/cve/CVE-2024-11477.html
  • CISA Known Exploited Vulnerabilities Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Rescana is here for you

At Rescana, we are committed to helping our customers navigate the complexities of cybersecurity through our Continuous Threat and Exposure Management (CTEM) platform. Our solutions are designed to provide organizations with the tools and insights necessary to identify, assess, and mitigate vulnerabilities effectively. We encourage you to reach out to us with any questions you may have about this report or any other cybersecurity concerns at ops@rescana.com.

724 views0 comments

Commentaires

Noté 0 étoile sur 5.
Pas encore de note

Ajouter une note
bottom of page