Warning of dangerous vulnerabilities on WinRAR, users should uninstall or upgrade to a new version
RARLAB, the developer of WinRAR, has just released an urgent update to patch a dangerous vulnerability in their software. This vulnerability was discovered by researcher Igor Sak-Sakovskiy. Tracked with the code CVE-2021-35052, the WinRAR vulnerability has a large scope of impact.
WinRAR is a popular file compression and decompression software, widely used on personal computers and also in offices and businesses. Therefore, if hackers successfully exploit the CVE-2021-35052 vulnerability, the consequences they cause will be very heavy.
Warning of dangerous vulnerabilities on WinRAR, users should uninstall or upgrade to a new version Picture 1
The vulnerability stems from WinRAR using insecure connections to access message content from the server side through Notifer Windows. Therefore, an attacker can penetrate this connection to install malicious code on the victim's machine to gain control. Moreover, hackers can also attack multiple targets at the same time to create large-scale targeted attack campaigns.
WinRAR has released update 6.02 to patch CVE-2021-35052.
For users, you can keep yourself safe by updating WinRAR. Alternatively, you can also completely remove this software from your computer and replace it with a better file compression and decompression software, such as 7zip.
You should read it
- Detecting serious security flaws that exist for more than 19 years on WinRAR, can affect 500 million users
- Detecting new malware on WinRAR can infiltrate computers and steal data
- Users who have not updated the WinRAR patch, despite being warned, continue to take advantage of the vulnerability to insert malicious code.
- Vulnerability in WinRAR puts users at risk of being attacked
- Link Download WinRAR 6.00b1: A free compression and decompression tool
- Why does Winrar give you a free trial for a lifetime?
- WinRAR is really free version, please download and experience
- Instructions for notes with WinRAR
- WinRAR settings automatically delete the root directory after decompressing the data
- Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement cases
- How to Use WinRAR
- How to crack Winrar Password - Find the Winrar compressed file password quickly and effectively
May be interested
Warning: The number of malware designed to target the M1 chipset is increasing rapidly, making it harder to detect
Kaseya suffered a ransomware attack, affecting a series of other technology companies
'Printer Catastrophe' Vulnerability Threatens All Versions of Windows
Warning: Babuk Locker Ransomware is Active Again, Attacking the World
Google launches new platform to help prevent Supply Chain attacks
NVIDIA Jetson chipset contains a series of security holes that allow data theft, DDoS attacks