Skip to main content

New PageObserved exploitation has involved targeted spear-phishing campaigns, using homoglyph attacks to spoof document extensions to lure users

Summary

Observed exploitation has involved targeted spear-phishing campaigns, using homoglyph attacks to spoof document extensions to lure users

Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

proof-of-concept (PoC) exploit has been released for the vulnerability CVE-2025-0411 by a security researcher that demonstrates how the exploitation of CVE-2025-0411 in 7-Zip can be achieved. 7-Zip is a popular, free, and open-source file compression and extraction software. 

CVE-2025-0411 is a 'Protection Mechanism Failure' vulnerability with a CVSSv3 score of 7.0. The specific flaw exists within the handling of archived files. The vulnerability could allow an attacker to craft an archive where 7-Zip will not apply the Mark-of-the-Web (MotW) to the extracted files. The MotW is a metadata identifier used by Microsoft Windows to mark files downloaded from the internet as potentially unsafe.

An attacker could leverage this vulnerability to bypass the MotW feature and execute arbitrary code in the context of the current user.

Active exploitation of CVE-2025-0411 has been observed in the wild. 

Threat updates

Remediation advice

Affected organisations are encouraged to update 7-Zip to version 24.09 or later as soon as practicable. 

Definitive source of threat updates

CVE Vulnerabilities

Last edited: 4 February 2025 3:56 pm