{"id":25703,"date":"2025-01-22T06:10:07","date_gmt":"2025-01-22T14:10:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2025\/01\/22\/news-19426\/"},"modified":"2025-01-22T06:10:07","modified_gmt":"2025-01-22T14:10:07","slug":"news-19426","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2025\/01\/22\/news-19426\/","title":{"rendered":"7-Zip bug could allow a bypass of a Windows security feature. Update now"},"content":{"rendered":"\n<p>A patch is available for a vulnerability in 7-Zip that could have allowed attackers to bypass the Mark-of-the-Web (MotW) security feature in Windows.<\/p>\n<p>The MotW is an attribute added to files by Windows when they have been sourced from an untrusted location, like the internet or a restricted zone. The MotW is what triggers warnings that opening or running such files could lead to potentially dangerous behavior, including installing malware on their devices. <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/06\/7-zip-gets-mark-of-the-web-feature-increases-protection-for-users\">7-Zip added support for MotW<\/a> in June 2022. <\/p>\n<p>The MotW also makes sure that Office documents that are marked with the MotW will be opened in Protected View, which automatically enables read-only mode and means that all macros will be disabled until the user allows them.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"379\" height=\"499\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2022\/02\/Unblock_VBA_macros.png?w=379\" alt=\"Security warning in file properties\" class=\"wp-image-69057\" \/><figcaption class=\"wp-element-caption\">MotW security warning in file properties<\/figcaption><\/figure>\n<p>For years, attackers were able to bypass the MotW by putting their malicious files in archives. This worked because the MotW is in fact another file that is attached to the main file as an <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2015\/07\/introduction-to-alternate-data-streams\">Alternate Data Stream (ADS)<\/a>, and over the years we have seen many vulnerabilities in archivers where the ADS didn&#8217;t pass on the individual files when the archive was decompressed.<\/p>\n<p>The same is true this time. Only the attacker will have to prepare an especially crafted nested archive. A nested archive means there is an open archive inside another open archive. Exploitation of the vulnerability also requires user interaction, meaning the target will have to visit a malicious page or open a malicious file.<\/p>\n<p>If you&#8217;re a Windows user, check whether you are using <a href=\"https:\/\/sourceforge.net\/p\/sevenzip\/discussion\/45797\/thread\/b95432c7ac\/#cf26\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">version 7-Zip 24.09<\/a> or later. If you&#8217;re not, then they&#8217;ll need to update.<\/p>\n<p>7-Zip does not have an auto-update function, so you will have to download the version that is suitable for your system from the <a href=\"https:\/\/7-zip.org\/download.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">7-Zip downloads page<\/a>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-other-security-measures\">Other security measures<\/h2>\n<p>There are some general safety tips to keep in mind when you\u2019re handling archived files on a regular basis:<\/p>\n<ul class=\"wp-block-list\">\n<li>Keep track of how and where you obtained the archive.<\/li>\n<li>Always be careful when opening archived files that you downloaded from the internet.<\/li>\n<li>Make sure you are using an updated <a href=\"https:\/\/www.malwarebytes.com\/premium\">anti-malware solution<\/a> that is capable of scanning inside archives, and you have that setting enabled.<\/li>\n<\/ul>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1002\" height=\"455\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/scan-archives.png\" alt=\"Malwarebytes scan within archives option enabled\" class=\"wp-image-147961\" \/><figcaption class=\"wp-element-caption\">Malwarebytes scan within archives option enabled<\/figcaption><\/figure>\n<ul class=\"wp-block-list\">\n<li>Keep track of who accesses archived files and when. This can help identify unauthorized access attempts and help monitor unwanted changes.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2025\/01\/7-zip-bug-could-allow-a-bypass-of-a-windows-security-feature-update-now\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A vulnerability in 7-Zip that could allow attackers to bypass the MotW security feature in Windows has been patched. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18397,22783,24883,32,10467],"class_list":["post-25703","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-7zip","tag-exploits-and-vulnerabilities","tag-motw","tag-news","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25703"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25703\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}