Microsoft’s ongoing efforts to enhance user experience in Windows 11 have introduced native support for a variety of new archive formats via the KB5031455 update.
While these changes have streamlined user workflows, they have also inadvertently opened Pandora’s box in the realm of cybersecurity, linking the operating system to potential vulnerabilities stemming from its reliance on libarchive, an open-source library used for handling multiple archive file formats.
Windows 11 Compression Expansion
Before October 2023, Windows 11 natively supported only ZIP files, categorized as “Compressed (zipped) Folder.”
![Windows 11 Compression Expansion](https://gbhackers.com/wp-content/uploads/2025/02/image-33.png)
The KB5031455 update expanded this feature to include 11 additional formats, including RAR, 7z, and TAR.
The changes were welcomed by users who no longer needed third-party tools like WinRAR or 7-Zip to handle these formats.
Underneath this user-friendly facade lies a technical shift. File Explorer now uses two distinct mechanisms: zipfldr.dll for handling ZIP files and archiveint.dll, which integrates libarchive, for managing the newly supported formats.
While libarchive is a robust library tested across platforms like Linux, macOS, and BSD, it has introduced significant security concerns.
libarchive Vulnerabilities
Libarchive, despite its maturity and extensive fuzz testing through Google’s OSS-Fuzz program, has shown cracks in its armor.
Recent research uncovered several serious security vulnerabilities tied to its use in Windows 11, including those already patched by Microsoft and others that persisted due to delays in addressing them upstream in libarchive.
Key Vulnerabilities Discovered:
- CVE-2024-26185: A loophole allowed arbitrary file write and delete operations when extracting files from archives in File Explorer.
![A loophole allowed arbitrary file](https://gbhackers.com/wp-content/uploads/2025/02/image-34.png)
Although it required precise user interaction, such as navigating deep archive structures and opening specific files, the exploit underscored poor filename filtering.
- CVE-2024-38165: Microsoft’s initial patch for CVE-2024-26185 was bypassed.
![Exploiting Windows](https://gbhackers.com/wp-content/uploads/2025/02/image-35.png)
By exploiting Windows’ handling of absolute paths in archives, attackers could write temporary files outside their intended directories, potentially enabling data manipulation.
- CVE-2024-26256: This severe Remote Code Execution (RCE) vulnerability stemmed from a heap buffer overflow in libarchive while processing RAR files. Exploiting this flaw allowed hackers to execute malicious code, putting users at significant risk.
- RCEs and File Confusion Bugs: Researchers even found that libarchive could mistakenly identify file formats, leading to further vulnerabilities. For instance, a low-compression RAR file containing a ZIP signature was misclassified, exposing users to potential attacks.
The integration of libarchive has significantly expanded the software’s attack surface.
Researchers noted that, in theory, Windows 11 could support over 91 decillion (10^33) archive format combinations due to libarchive’s ability to chain filters and formats.
![Error](https://gbhackers.com/wp-content/uploads/2025/02/image-11.jpg)
While this flexibility theoretically enables broad compatibility, it also dramatically increases the likelihood of unanticipated security flaws.
Despite continuous fuzz testing, libarchive’s oversight of certain file formats and its reliance on CRC checks posed challenges for automated vulnerability detection.
Even after vulnerabilities like CVE-2024-20696 and CVE-2024-20697 were found, a disconnect between Microsoft and the libarchive maintainers led to a “Half-day” scenario, where vulnerabilities patched in Microsoft’s fork of libarchive went unaddressed upstream for months.
The lack of immediate CVE issuance and public awareness further delayed the deployment of critical patches, leaving downstream users and projects vulnerable.
The delay highlights the risks inherent in the fragmented nature of open-source software development when integrated into proprietary systems.
As Windows 11 users enjoy the convenience of handling multiple archive formats directly in File Explorer, it is crucial to remember that such luxury must come with vigilance.
Keeping systems up to date and monitoring emerging vulnerabilities remain essential steps for mitigating risks in an ever-evolving cybersecurity landscape.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free