North Korean APT Kimsuky aka Black Banshee – Active IOCs
June 24, 2025UAC-0001 Hackers Target ICS Devices on Windows Servers – Active IOCs
June 24, 2025North Korean APT Kimsuky aka Black Banshee – Active IOCs
June 24, 2025UAC-0001 Hackers Target ICS Devices on Windows Servers – Active IOCs
June 24, 2025Severity
Medium
Analysis Summary
A critical security vulnerability tracked as CVE-2025-6218 has been discovered in RARLAB’s widely used WinRAR utility. This flaw, carrying a CVSS score of High, stems from improper handling of directory paths within archive files, resulting in a directory traversal vulnerability formally documented as ZDI-25-409. If exploited, it enables remote code execution (RCE) on the victim’s system with the privileges of the current user. Although the attack requires user interaction, such as opening a malicious archive or visiting a compromised site, the impact spans across confidentiality, integrity, and availability, making it a serious threat.
The vulnerability lies within WinRAR’s file path processing routines, where specially crafted archive files containing directory traversal patterns (like “../”) can cause the application to extract files outside the intended directory. This improper validation bypasses standard security boundaries and allows attackers to write or place files in unauthorized system locations. Combined with other techniques, this flaw can be weaponized to achieve full system compromise, especially when the user has elevated privileges.
Discovered by researchers, the flaw highlights how common tools like WinRAR can become vectors for sophisticated cyberattacks through social engineering. Attackers can trick users into executing malicious archives, which, upon extraction, can inject harmful files into sensitive directories or execute arbitrary code. The RCE potential tied to such an attack could allow adversaries to deploy malware, install backdoors, or even gain persistent access to enterprise systems.
RARLAB responded swiftly by issuing a security update on June 19, 2025, in WinRAR version 7.11, which patches the vulnerability and introduces performance improvements. Users and organizations are strongly urged to update immediately to mitigate the risk of exploitation. Given the widespread use of WinRAR, especially in corporate environments, failure to apply this patch could expose systems to targeted attacks and broader compromise through routine user actions like extracting files.
Impact
- Code Execution
- Gain Access
- Security Bypass
Indicators of Compromise
CVE
CVE-2025-6218
Affected Vendors
- WinRAR
Affected Products
- RARLAB WinRAR 7.10
Remediation
- Update to WinRAR version 7.11 immediately, as it contains the official patch for CVE-2025-6218.
- Avoid opening archive files from unknown or untrusted sources, especially those received via email or downloaded from unfamiliar websites.
- Block access to suspicious websites that may host or distribute malicious archive files using web filtering tools.
- Use antivirus or endpoint protection software that scans archive files and detects suspicious file path behaviors.
- Restrict user privileges to prevent attackers from gaining full system access if code execution occurs.
- Implement file system monitoring tools to detect unauthorized file writes or extraction behaviors outside designated directories.
- Deploy application whitelisting to control which software is allowed to execute on endpoints.
- Regularly audit and update third-party applications like WinRAR across all organizational systems.