๐Ÿ” CVE Alert

CVE-2024-8811

HIGH 7.8

WinZip Mark-of-the-Web Bypass Vulnerability

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

WinZip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archive files. When opening an archive that bears the Mark-of-the-Web, WinZip removes the Mark-of-the-Web from the archive file. Following extraction, the extracted files also lack the Mark-of-the-Web. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23983.

CWE CWE-693
Vendor winzip computing
Product winzip
Published Nov 22, 2024
Last Updated Dec 2, 2024
Stay Ahead of the Next One

Get instant alerts for winzip computing winzip

Be the first to know when new high vulnerabilities affecting winzip computing winzip are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Versions

WinZip Computing / WinZip
28.0 (15640) 64-bit

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
zerodayinitiative.com: https://www.zerodayinitiative.com/advisories/ZDI-24-1234/