A critical security flaw, identified as CVE-2024-11477, has been discovered in 7-Zip, a widely used file compression and archiving tool. The vulnerability lies within the Zstandard decompression function, where improper validation of user-provided input can lead to an integer underflow. This flaw could enable attackers to execute arbitrary code within the application's process, posing a serious threat to affected systems. Discovered by Nicholas Zubrisky from Trend Micro Security Research, the vulnerability has been rated with a CVSS score of 7.8, reflecting its high exploitability. Attackers can leverage this issue by tricking users into opening maliciously crafted archive files, potentially leading to remote code execution. If successfully exploited, the consequences could include unauthorized access to sensitive data or full control of the targeted system. While exploiting this vulnerability requires user interaction, the methods may vary depending on the implementation of the Zstandard decompression function. To mitigate the risk, users are urged to update 7-Zip to the latest version as soon as possible to safeguard their systems against potential threats.
The Symantec Threat Hunter Team has uncovered two major cyber intrusions targeting Ukrainian organizations, attributed to Russian-aligned threat actors. Active from late June to Au...
Attackers based in China are taking advantage of vulnerabilities in Cisco ASA, which is widely used by governments and big organizations around the world. According to Palo Alto Ne...
Conduent Business Services, LLC (“Conduent”), a major back-office services provider to government agencies, insurers and healthcare organisations, has confirmed a large-scale d...