New PageObserved exploitation has involved targeted spear-phishing campaigns, using homoglyph attacks to spoof document extensions to lure users
Summary
Observed exploitation has involved targeted spear-phishing campaigns, using homoglyph attacks to spoof document extensions to lure users
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
A proof-of-concept (PoC) exploit has been released for the vulnerability CVE-2025-0411 by a security researcher that demonstrates how the exploitation of CVE-2025-0411 in 7-Zip can be achieved. 7-Zip is a popular, free, and open-source file compression and extraction software.
CVE-2025-0411 is a 'Protection Mechanism Failure' vulnerability with a CVSSv3 score of 7.0. The specific flaw exists within the handling of archived files. The vulnerability could allow an attacker to craft an archive where 7-Zip will not apply the Mark-of-the-Web (MotW) to the extracted files. The MotW is a metadata identifier used by Microsoft Windows to mark files downloaded from the internet as potentially unsafe.
An attacker could leverage this vulnerability to bypass the MotW feature and execute arbitrary code in the context of the current user.
Active exploitation of CVE-2025-0411 has been observed in the wild.
Threat updates
Remediation advice
Affected organisations are encouraged to update 7-Zip to version 24.09 or later as soon as practicable.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 4 February 2025 3:56 pm