Known Exploited Vulnerability
7.8
HIGH
CVE-2023-38831
RARLAB WinRAR Code Execution Vulnerability - [Actively Exploited]
Description

RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.

INFO

Published Date :

Aug. 23, 2023, 5:15 p.m.

Last Modified :

Dec. 20, 2024, 5:50 p.m.

Source :

cve@mitre.org

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

RARLAB WinRAR contains an unspecified vulnerability that allows an attacker to execute code when a user attempts to view a benign file within a ZIP archive.

Required Action :

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Notes :

http://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=232&cHash=c5bf79590657e32554c6683296a8e8aa; https://nvd.nist.gov/vuln/detail/CVE-2023-38831

Public PoC/Exploit Available at Github

CVE-2023-38831 has a 108 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2023-38831 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Rarlab winrar
References to Advisories, Solutions, and Tools

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

CVE-2023-38831WinRAR代码执行漏洞复现资源文件

Updated: 1 week, 3 days ago
0 stars 0 fork 0 watcher
Born at : Dec. 31, 2024, 4:14 a.m. This repo has been linked 1 different CVEs too.

POC Exploit Script in Python

Updated: 1 week, 4 days ago
0 stars 0 fork 0 watcher
Born at : Dec. 30, 2024, 3:33 a.m. This repo has been linked 1 different CVEs too.

None

Python

Updated: 1 week, 5 days ago
0 stars 0 fork 0 watcher
Born at : Dec. 28, 2024, 8:26 a.m. This repo has been linked 2 different CVEs too.

None

Updated: 3 weeks, 1 day ago
0 stars 0 fork 0 watcher
Born at : Dec. 19, 2024, 1:46 a.m. This repo has been linked 123 different CVEs too.

None

Updated: 4 weeks ago
0 stars 0 fork 0 watcher
Born at : Dec. 13, 2024, 8:02 a.m. This repo has been linked 1 different CVEs too.

None

Python

Updated: 1 month, 1 week ago
0 stars 0 fork 0 watcher
Born at : Dec. 3, 2024, 11:13 a.m. This repo has been linked 1 different CVEs too.

Cybersecurity MSc final project study

cpp python ransomware rust

C++ Makefile Python Rust Batchfile

Updated: 1 month, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Nov. 18, 2024, 9:17 a.m. This repo has been linked 1 different CVEs too.

CVE-2023-38831 is a Zero-day WinRAR vulnerability that lets attackers disguise malicious files in archives, tricking users into executing harmful content.

Batchfile Python

Updated: 1 month, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Nov. 11, 2024, 2:25 p.m. This repo has been linked 1 different CVEs too.

None

Python Batchfile

Updated: 2 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Oct. 17, 2024, 4:43 a.m. This repo has been linked 1 different CVEs too.

None

Python Batchfile

Updated: 2 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Oct. 17, 2024, 4:17 a.m. This repo has been linked 2 different CVEs too.

None

C Batchfile PowerShell

Updated: 2 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Oct. 15, 2024, 6:23 a.m. This repo has been linked 1 different CVEs too.

None

Python Batchfile

Updated: 3 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : Sept. 27, 2024, 7:11 p.m. This repo has been linked 1 different CVEs too.

This project contains a Python script that exploits **CVE-2023-38831**, a vulnerability in **WinRAR** versions prior to 6.23. The exploit generates a **malicious RAR archive** that triggers the execution of arbitrary code when the victim opens a benign-looking file within the archive (such as a PDF).

Python Batchfile

Updated: 3 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : Sept. 27, 2024, 6:23 p.m. This repo has been linked 1 different CVEs too.

d

Updated: 3 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Sept. 26, 2024, 7:44 p.m. This repo has been linked 1 different CVEs too.

None

Updated: 4 months ago
0 stars 0 fork 0 watcher
Born at : Sept. 9, 2024, 1:28 a.m. This repo has been linked 128 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-38831 vulnerability anywhere in the article.

  • BleepingComputer
Russian Turla hackers hit Starlink-connected devices in Ukraine

Russian cyber-espionage group Turla, aka "Secret Blizzard," is utilizing other threat actors' infrastructure to target Ukrainian military devices connected via Starlink. Microsoft and Lumen recently e ... Read more

Published Date: Dec 11, 2024 (4 weeks, 1 day ago)
  • BleepingComputer
Russian cyber spies hide behind other hackers to target Ukraine

Russian cyber-espionage group Turla, aka "Secret Blizzard," is utilizing other threat actors' infrastructure to target Ukrainian military devices connected via Starlink. Microsoft and Lumen recently e ... Read more

Published Date: Dec 11, 2024 (4 weeks, 1 day ago)
  • The Cyber Express
Head Mare Targets Russian Orgs with Hidden LNK Files, Ransomware

Cyble researchers have detected a new campaign targeting Russia by the hacktivist group Head Mare that uses a disguised LNK file to hide an executable. The campaign is also noteworthy for its ability ... Read more

Published Date: Dec 11, 2024 (4 weeks, 2 days ago)
  • Kaspersky
Exploits and vulnerabilities in Q3 2024

Q3 2024 saw multiple vulnerabilities discovered in Windows and Linux subsystems that are not standard for cyberattacks. This is because operating system developers have been releasing new security mit ... Read more

Published Date: Dec 06, 2024 (1 month ago)
  • Kaspersky
IT threat evolution Q3 2024

IT threat evolution in Q3 2024 IT threat evolution in Q3 2024. Non-mobile statistics IT threat evolution in Q3 2024. Mobile statistics Targeted attacks New APT threat actor targets Russian government ... Read more

Published Date: Nov 29, 2024 (1 month, 1 week ago)
  • Cybersecurity News
Asyncshell: The Evolution of APT-K-47’s Cyber Arsenal

Attack Chain | Image: Knownsec 404 Advanced Threat Intelligence teamThe Knownsec 404 Advanced Threat Intelligence team has uncovered a sophisticated and evolving threat from the APT-K-47 group, also k ... Read more

Published Date: Nov 25, 2024 (1 month, 2 weeks ago)
  • The Hacker News
APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware

The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called Asynshell. The attack campaign is said to have used Hajj-themed lures to trick victims into ... Read more

Published Date: Nov 22, 2024 (1 month, 2 weeks ago)
  • security.nl
VS publiceert overzicht van meest misbruikte kwetsbaarheden in 2023

De Amerikaanse autoriteiten hebben samen met cyberagentschappen uit Australië, Canada, Nieuw-Zeeland en het Verenigd Koninkrijk een overzicht van de meest misbruikte kwetsbaarheden in 2023 opgesteld. ... Read more

Published Date: Nov 12, 2024 (1 month, 4 weeks ago)
  • Cybersecurity News
SloppyLemming’s Espionage Campaign Targets South Asia

A recent report from Cloudforce One has detailed a cyber espionage campaign orchestrated by a threat actor dubbed SloppyLemming, targeting government, defense, telecommunications, and energy sectors a ... Read more

Published Date: Sep 28, 2024 (3 months, 1 week ago)
  • The Hacker News
Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

Cloud Security / Cyber Espionage An advanced threat actor with an India nexus has been observed using multiple cloud service providers to facilitate credential harvesting, malware delivery, and comman ... Read more

Published Date: Sep 26, 2024 (3 months, 2 weeks ago)
  • Dark Reading
'SloppyLemming' APT Abuses Cloudflare Service in Pakistan Attacks

Source: National Picture Library via Alamy Stock PhotoA threat actor is leveraging Cloudflare Worker cloud services and other tools to perform espionage against government and law enforcement targets ... Read more

Published Date: Sep 26, 2024 (3 months, 2 weeks ago)
  • Cybersecurity News
Ajina.Banker: Unmasking the Android Malware Targeting Central Asian Banks

Screenshot of the sample found on the VirusTotal platformCybersecurity analysts at Group-IB have uncovered a sophisticated malware campaign targeting bank customers in Central Asia. Dubbed “Ajina.Bank ... Read more

Published Date: Sep 16, 2024 (3 months, 3 weeks ago)
  • The Hacker News
Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus

A hacktivist group known as Head Mare has been linked to cyber attacks that exclusively target organizations located in Russia and Belarus. "Head Mare uses more up-to-date methods for obtaining initia ... Read more

Published Date: Sep 03, 2024 (4 months, 1 week ago)
  • Kaspersky
Head Mare: adventures of a unicorn in Russia and Belarus

Head Mare is a hacktivist group that first made itself known in 2023 on the social network X (formerly Twitter)[1]. In their public posts, the attackers reveal information about some of their victims, ... Read more

Published Date: Sep 02, 2024 (4 months, 1 week ago)
  • Cybersecurity News
Warning: Fake WinRar Websites Distributing Malware

SonicWall has recently issued a cybersecurity alert about a deceptive website that mimics the official WinRar site. This fake site, win-rar.co, not only closely resembles the legitimate WinRar site bu ... Read more

Published Date: Aug 07, 2024 (5 months ago)
  • The Cloudflare Blog
RADIUS/UDP vulnerable to improved MD5 collision attack

2024-07-0917 min readThe MD5 cryptographic hash function was first broken in 2004, when researchers demonstrated the first MD5 collision, namely two different messages X1 and X2 where MD5(X1) = MD5 (X ... Read more

Published Date: Jul 09, 2024 (6 months ago)
  • Google
Government-backed actors exploiting WinRAR vulnerability

K Kate Morgan Threat Analysis Group In recent weeks, Google’s Threat Analysis Group’s (TAG) has observed multiple government-backed hacking groups exploiting the known vulnerability, CVE-2023-38831, i ... Read more

Published Date: Oct 18, 2023 (1 year, 2 months ago)

The following table lists the changes that have been made to the CVE-2023-38831 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by nvd@nist.gov

    Dec. 20, 2024

    Action Type Old Value New Value
    Changed Reference Type https://news.ycombinator.com/item?id=37236100 Issue Tracking, Third Party Advisory https://news.ycombinator.com/item?id=37236100 Issue Tracking
    Changed Reference Type https://news.ycombinator.com/item?id=37236100 Issue Tracking, Third Party Advisory https://news.ycombinator.com/item?id=37236100 Issue Tracking
    Changed Reference Type https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/ Exploit, Third Party Advisory https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/ Exploit, Press/Media Coverage, Third Party Advisory
    Changed Reference Type https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/ Exploit, Third Party Advisory https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/ Exploit, Press/Media Coverage, Third Party Advisory
    Changed Reference Type https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ Exploit, Third Party Advisory https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ Exploit, Press/Media Coverage, Third Party Advisory
    Changed Reference Type https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ Exploit, Third Party Advisory https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ Exploit, Press/Media Coverage, Third Party Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html
    Added Reference https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/
    Added Reference https://news.ycombinator.com/item?id=37236100
    Added Reference https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/
    Added Reference https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
  • Modified Analysis by nvd@nist.gov

    Aug. 14, 2024

    Action Type Old Value New Value
    Removed CWE NIST NVD-CWE-noinfo
    Added CWE NIST CWE-345
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Jul. 03, 2024

    Action Type Old Value New Value
    Added CWE CISA-ADP CWE-351
    Added CVSS V3.1 CISA-ADP AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Modified Analysis by nvd@nist.gov

    Jun. 27, 2024

    Action Type Old Value New Value
    Changed Reference Type http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html No Types Assigned http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ No Types Assigned https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ Exploit, Third Party Advisory
  • CVE Modified by cve@mitre.org

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by cve@mitre.org

    Oct. 23, 2023

    Action Type Old Value New Value
    Changed Description RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
  • CVE Modified by cve@mitre.org

    Oct. 19, 2023

    Action Type Old Value New Value
    Changed Description RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through August 2023. RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.
    Added Reference https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ [No Types Assigned]
  • CVE Modified by cve@mitre.org

    Sep. 08, 2023

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/174573/WinRAR-Remote-Code-Execution.html [No Types Assigned]
  • Initial Analysis by nvd@nist.gov

    Aug. 29, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
    Changed Reference Type https://news.ycombinator.com/item?id=37236100 No Types Assigned https://news.ycombinator.com/item?id=37236100 Issue Tracking, Third Party Advisory
    Changed Reference Type https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/ No Types Assigned https://www.bleepingcomputer.com/news/security/winrar-zero-day-exploited-since-april-to-hack-trading-accounts/ Exploit, Third Party Advisory
    Changed Reference Type https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ No Types Assigned https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/ Exploit, Third Party Advisory
    Added CWE NIST NVD-CWE-noinfo
    Added CPE Configuration OR *cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:* versions up to (excluding) 6.23
  • CVE Modified by cve@mitre.org

    Aug. 23, 2023

    Action Type Old Value New Value
    Added Reference https://news.ycombinator.com/item?id=37236100 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-38831 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

45.38 }} -1.01%

score

0.97479

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability