CrowdStrike Update Causes BSOD Issues Globally – Audit Available 🛡️ Learn more


New RCE Vulnerability Found in WinRAR

2 min. read
By Laura Libeer
Winrar Vulnerability

 TL;DR | Go Straight to the WinRAR Vulnerability Audit Report

A high-security security RCE vulnerability in WinRAR has been fixed in WinRAR 6.23 released earlier this month. If successfully exploited, the vulnerability could lead to remote code execution. This could in turn lead to privilege escalation, data theft, denial of service, and more. We have added a new report to Lansweeper to help you locate vulnerable devices.

WinRAR Vulnerability CVE-2023-40477

The vulnerability tracked as CVE-2023-40477 is a case of improper validation while processing recovery volumes. It received a CVSS score of 7.8 An attacker could use this flaw to execute arbitrary code by tricking its targets into visiting maliciously crafted web pages or opening a malicious file. Arbitrary code execution attacks can compromise the integrity of sensitive data and files. You can read more about this vulnerability in this advisory from the Zero Day Initiative.

Update Vulnerable WinRAR Installations

The Zero Day Initiative reported the issue to RARLAB on the 8th of June. The issue was addressed in the WinRAR 6.23 release on August 2nd, along with 3 other issues. In order to protect yourself against potential threats, make sure to update any WinRAR installations to the latest version.

Discover Vulnerable WinRAR Installs

We have added a new report to Lansweeper to help you locate any WinRAR installations in your network that still need to be updated to version 6.23 or higher. This way you have an actionable list of devices that still need your intervention. You can get the report via the link below.

WinRAR Vulnerability Report

Run the WinRAR Vulnerability Audit


Ready to get started?
You’ll be up and running in no time.

Explore all our features, free for 14 days.