CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-11477

Critical Severity
7-zip
SVRS
73/100

CVSSv3
7.8/10

EPSS
0.21188/1

CVE-2024-11477 is a critical remote code execution vulnerability in 7-Zip's Zstandard decompression functionality. This integer underflow flaw allows attackers to potentially execute arbitrary code on systems using vulnerable versions of 7-Zip when processing specially crafted files. While the CVSS score is 7.8, the SOCRadar Vulnerability Risk Score (SVRS) is 73, indicating a substantial risk that warrants review, but does not necessitate immediate action based on SOCRadar's scale. The vulnerability stems from inadequate validation of user-supplied data during Zstandard decompression, leading to a buffer overflow. Successful exploitation allows an attacker to execute code within the current process's context. Although not considered "critical" as defined by SOCRadar(SVRS > 80), organizations should prioritize patching to mitigate the risk of malicious actors exploiting this vulnerability. Given that this is listed "In The Wild", this vulnerability is significant because of its potential for widespread impact.

In The Wild
X_research-advisory
CVSS:3.1
AV:L
AC:L
PR:N
UI:R
S:U
C:H
I:H
A:H
2024-11-22

2025-02-15
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-11477 is a vulnerability with an unknown description at this time. The vulnerability has been assigned an SVRS (SOCRadar Vulnerability Risk Score) of 30, indicating a moderate risk level. While this score is not critical (above 80), it is important to note that the CVE is currently being exploited "In The Wild". This means attackers are actively using this vulnerability, requiring immediate attention and mitigation.

Key Insights

  1. Limited Information: The lack of a description for CVE-2024-11477 makes it challenging to fully understand the vulnerability's nature, impact, and potential exploitation methods. This lack of information further emphasizes the urgency of immediate investigation and mitigation efforts.
  2. Active Exploitation: The "In The Wild" tag indicates that malicious actors are actively exploiting this vulnerability. This implies attackers have developed and are using exploits targeting this weakness.
  3. Unknown Impact: The absence of detailed information on the vulnerability's nature means the potential impact on affected systems is unknown. It is crucial to investigate the vulnerability's scope and impact to determine necessary security measures.
  4. SVRS as a Guide: While the CVSS score of 0 provides no guidance, the SVRS score of 30, combined with the "In The Wild" status, highlights the importance of proactive security measures. This vulnerability requires attention despite its seemingly moderate SVRS score due to its active exploitation.

Mitigation Strategies

  1. Urgent Patching: As soon as detailed information regarding the vulnerability becomes available, prioritize patching affected systems. This will mitigate the risk of exploitation and ensure the highest level of security.
  2. Threat Intelligence: Actively monitor threat intelligence feeds and security advisories for any updates related to CVE-2024-11477. These updates may provide insights into the vulnerability's specifics and potential exploits, enabling more targeted mitigation efforts.
  3. Network Security: Implement strict network security measures, such as firewalls and intrusion detection systems, to identify and block potential attack attempts.
  4. Vulnerability Scanning: Conduct regular vulnerability scans to identify systems potentially affected by CVE-2024-11477. This allows for timely identification and remediation of any vulnerable configurations.

Additional Information

For further information on this incident, or for assistance in implementing any of the mitigation strategies, you can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket.

Indicators of Compromise

TypeIndicatorDate
HASH
fe581134d7ae4857a97443270a27e0fa2024-12-03
HASH
c1191c405e82c32c645acb82f875fdd8fad292092024-12-03
URL
http://bytequestixo.pro/wWge/2024-12-03
URL
http://ctrk.klclick3.com/l/01J5V2NHDC0KB0P8B51Z9PCPZS_02024-12-03
URL
http://cyberdynalumeo.ru/1RB3Y/2024-12-03
URL
http://docsecureatt-docdrive-filedoc.pages.dev/2024-12-03
URL
http://enterbuzztechscener.pl/pbtmx/2024-12-03

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Long Term Support Channel Update for ChromeOS
Giuliana Pritchard ([email protected])2025-04-17
Long Term Support Channel Update for ChromeOS | A new LTS&nbsp; version 126.0.6478.270&nbsp;(Platform Version: 15886.95.0), is being<span face="Roboto, sans-serif" style="vertical
blogger.com
rss
forum
news
Protecting against attacks in ZIP, RAR, CAB, MSI, ISO and other archives | Kaspersky official blog
Stan Kaminsky2025-04-11
Protecting against attacks in ZIP, RAR, CAB, MSI, ISO and other archives | Kaspersky official blog | How attackers disguise malware in archives, and what to do to protect your businessArchiving programs designed to simplify file storage and transfers have become common tools not only for users but also for attackers. Malicious archives are regularly found in both targeted attacks and ransomware incidents. Attackers mainly use them to bypass security measures, deceive users, and, of course, extract stolen data. This means cybersecurity and IT departments should pay close attention to how archives are handled in operating systems, business
kaspersky.com
rss
forum
news
CVE-2024-11477 | 7-Zip up to 24.01 Zstandard Decompression integer underflow (ZDI-24-1532 / Nessus ID 211725)
vuldb.com2025-02-24
CVE-2024-11477 | 7-Zip up to 24.01 Zstandard Decompression integer underflow (ZDI-24-1532 / Nessus ID 211725) | A vulnerability has been found in 7-Zip and classified as critical. Affected by this vulnerability is an unknown functionality of the component Zstandard Decompression Handler. The manipulation leads to integer underflow. This vulnerability is known as CVE-2024-11477. The attack can be launched remotely
vuldb.com
rss
forum
news
2024-118: Critical Vulnerability in 7-Zip
2025-02-01
2024-118: Critical Vulnerability in 7-Zip | A severe security vulnerability has been discovered in 7-Zip, the popular file compression utility, allowing remote attackers to execute malicious code through specially crafted archives. The vulnerability tracked as CVE-2024-11477 has received a high CVSS score of 7.8.
europa.eu
rss
forum
news
Critical 7-Zip Zero-Day Exploit Leaked Online – Hackers Hijack Windows PCs Remotely
Balaji N2024-12-30
Critical 7-Zip Zero-Day Exploit Leaked Online – Hackers Hijack Windows PCs Remotely | A critical 7-Zip zero-day exploit has been publicly leaked by a hacker who is an individual operating under the alias &#8220;NSA_Employee39&#8221; on X allow attackers to execute arbitrary code on a victim’s machine when opened or extracted with the latest version of 7-Zip. This disclosure poses significant cybersecurity risks, particularly in the context of Infostealer [&#8230;] The post Critical 7-Zip Zero
cybersecuritynews.com
rss
forum
news
ZDI-24-1532: 7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability
2024-12-02
ZDI-24-1532: 7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability | This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-11477.
zerodayinitiative.com
rss
forum
news
1.781
2024-12-02
1.781 | Newly Added (1)7-Zip CVE-2024-11477 Remote Code Execution Vulnerability
fortiguard.com
rss
forum
news

Social Media

Vulnerability: Package 7-zip affected by CVE-2024-11477 affecting GitOnBorg::chromium::chromium::src https://t.co/GNUjwsgjJV
0
0
0
@thoughtfault Is your 0-day different from CVE-2024-11477: 7-Zip integer overflow? Your PoC didn't mention affected versions &amp; what OS is affected. Would be looking out for your PoC video, hopefully this is not an April fool joke!
0
0
0
@NSA_Employee39 FYI, 7zip source is freely available. In 24.08 (which isn't the latest but is what I have loaded from my CVE-2024-11477 writeup), there are 0 calls to "RC_NORM" in LzmaDec.c. In fact, the macro is only defined in LzmaEnc.c...
1
0
1
CVE-2024-11477: 7-Zip Vulnerability Allows Remote Code Execution, Update Now! #7ZipVulnerability #RemoteCodeExecution #UpdateNow #CVE202411477 #CybersecurityNews https://t.co/wizWuQahOq
0
0
0
csirt_it: ‼️ #7Zip: Proof of Concept (#PoC) per lo sfruttamento della vulnerabilità CVE-2024-11477 risulta disponibile in rete ⚠️ Ove non provveduto, si raccomanda l’aggiornamento tempestivo del software interessato https://t.co/UPehxcm76C
0
0
0
#AllertaSicurezza: Una vulnerabilità critica è stata scoperta nel software di compressione 7-Zip! Classificato come alto rischio (CVE-2024-11477, CVSS 7,8), il difetto riguarda l'elaborazione di file con l'algoritmo Zstandard. Potrebbe consentire agli hacker di eseguire… https://t.co/bnNH21vGEA
0
0
0
A newly discovered vulnerability in 7-Zip, a widely used file compression utility, has raised significant cybersecurity concerns. Tracked as CVE-2024-11477, this flaw allows attackers to execute malicious code through specially crafted archive files. Watch the video till the https://t.co/aputhQMoY0
0
0
0
So I spent some time trying to make a video about CVE-2024-11477, a vulnerability in 7-zip. This led my down a wild rabbit hole of patch diffing, software fuzzing, and ultimately crashing 7-zip over 4000 times. Check it out.
1
1
19
Attention 7-Zip users! A critical vulnerability (CVE-2024-11477) has been discovered that may allow the execution of malicious code when opening compromised files. It is recommended to update to the latest version (24.07 or higher). #Security #MandatoryUpdate #7Zip https://t.co/ClJy9QX6bR
0
0
0
A critical vulnerability (CVE-2024-11477) in 7-Zip enables remote code execution due to insufficient validation of user-supplied data. ⚠️ #cybersecurity #vulnerability #7Zip https://t.co/Uc4zsjQQll https://t.co/Uc4zsjQQll
1
0
0

Affected Software

Configuration 1
TypeVendorProduct
App7-zip7-zip

References

ReferenceLink
ZDI-24-1532https://www.zerodayinitiative.com/advisories/ZDI-24-1532/
AF854A3A-2127-422B-91AE-364DA2661108https://security.netapp.com/advisory/ntap-20250214-0007/
[email protected]https://www.zerodayinitiative.com/advisories/ZDI-24-1532/

CWE Details

CWE IDCWE NameDescription
CWE-191Integer Underflow (Wrap or Wraparound)The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence