A previously unknown zero-day vulnerability in the popular file compression tool 7-Zip has been publicly disclosed by an anonymous user claiming to be an NSA employee.
The disclosure, made on X (formerly Twitter), reveals a severe security flaw that could have far-reaching implications for both individual users and organizations globally.
GBHackers recently reported a severe security vulnerability has been discovered in 7-Zip, the popular file compression utility, allowing remote attackers to execute malicious code through specially crafted archives.
The newly discovered vulnerability targets 7-Zip’s LZMA decoder, allowing attackers to execute malicious code on victims’ machines simply by having them open or extract compromised .7z files.
“This zero-day flaw lies in the LZMA decoder of 7-Zip and leverages a malformed LZMA stream to trigger a buffer overflow in the RC_NORM function.”
“By manipulating buffer pointers and aligning payloads, attackers can execute shellcode, culminating in arbitrary code execution.”
Security experts warn that this exploit could be particularly devastating when combined with infostealer malware, as it eliminates the need for traditional password-protected archive files in attack scenarios.
“This vulnerability represents a significant shift in how threat actors could distribute malware,
“The simplicity of the attack vector requiring only that a user open a .7z file—makes it particularly dangerous.”
Particularly concerning is the vulnerability’s potential impact on supply chain security. Many organizations utilize automated systems for processing archived files, potentially creating a perfect storm for widespread compromise if exploited. Companies that regularly handle third-party .7z files in their operations are especially at risk.
The cybersecurity community has responded swiftly to the disclosure, with experts recommending immediate protective measures:
Adding to the concern, the same anonymous source has indicated plans to release another zero-day vulnerability targeting MyBB forum software, potentially threatening countless online communities’ security.
As of publication, no official patch has been released for the 7-Zip vulnerability. The software’s development team has not yet publicly commented on the disclosure.
Organizations and users are advised to monitor official channels for security updates and implement recommended mitigation strategies immediately.
“This is a critical moment for cybersecurity professionals. The combination of a widely-used tool like 7-Zip and the simplicity of exploitation makes this vulnerability particularly concerning.”
Security experts worldwide continue to analyze the exploit’s implications while awaiting an official response from 7-Zip’s development team.
Users and organizations are strongly advised to stay vigilant and implement recommended security measures until a patch becomes available.
Update:
We have learned that Igor Pavlov, the creator of 7-Zip, dismissed the claims in the 7-Zip discussion forum’s bugs section, stating: “This report on Twitter is fake. I don’t understand why this Twitter user made such a claim. There is no ACE vulnerability in 7-Zip / LZMA.”
The @NSA_Employee39 account did not respond immediately to requests for comment on social media.
A cybersecurity researcher has demonstrated a method to bypass BitLocker encryption on Windows 11 (version…
SmuggleShield, a recently launched browser extension, is gaining attention in the cybersecurity space for its…
Cloud security researchers have uncovered alarming trends in identity compromises within Amazon Web Services (AWS)…
Trend Micro has addressed six high-severity vulnerabilities in its Apex One and Apex One as a Service product, which…
A 20-year-old U.S. Army soldier, Cameron John Wagenius, has been arrested and indicted by federal…
D-Link warned users of several legacy router models about known vulnerabilities actively exploited by botnets.…