CVE-2024-55504

5.5 MEDIUM

📋 TL;DR

This vulnerability allows local attackers to execute arbitrary code via a malicious dynamic library (dylib) injection in RAR Extractor - Unarchiver Free and Pro version 6.4.0 on macOS. Attackers can potentially gain remote control and access sensitive user data. Only macOS users running the vulnerable version are affected.

💻 Affected Systems

Products:
  • RAR Extractor - Unarchiver Free
  • RAR Extractor - Unarchiver Pro
Versions: v6.4.0
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS due to the dylib injection mechanism. Requires the vulnerable version to be installed and executed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to access user files and install additional malware.

🟢

If Mitigated

Limited impact if application runs with minimal privileges and proper sandboxing is enforced.

🌐 Internet-Facing: LOW - Exploitation requires local access to the system.
🏢 Internal Only: MEDIUM - Local attackers or malware with user-level access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to place malicious dylib and trigger execution through the vulnerable application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check for updates in the Mac App Store. 2. If no update is available, consider uninstalling the application until a patch is released.

🔧 Temporary Workarounds

Uninstall vulnerable application

macOS

Remove RAR Extractor - Unarchiver Free/Pro v6.4.0 from your system

sudo rm -rf /Applications/RAR\ Extractor\ -\ Unarchiver\ Free.app
sudo rm -rf /Applications/RAR\ Extractor\ -\ Unarchiver\ Pro.app

Restrict application execution

macOS

Use macOS Gatekeeper or parental controls to prevent execution of the vulnerable application

sudo spctl --master-disable
Then use System Preferences > Security & Privacy > General to block the application

🧯 If You Can't Patch

  • Run the application in a sandboxed environment with minimal privileges
  • Monitor for suspicious dylib loading events using macOS security tools

🔍 How to Verify

Check if Vulnerable:

Check application version in Finder by right-clicking the app > Get Info, or check in the Mac App Store purchase history

Check Version:

mdls -name kMDItemVersion /Applications/RAR\ Extractor\ -\ Unarchiver\*.app 2>/dev/null || echo 'Application not found'

Verify Fix Applied:

Verify the application is no longer installed or has been updated to a version newer than 6.4.0

📡 Detection & Monitoring

Log Indicators:

  • Unusual dylib loading events in system.log
  • Application crash reports related to RAR Extractor

Network Indicators:

  • Unexpected outbound connections from the RAR Extractor process

SIEM Query:

process.name:"RAR Extractor" AND event.action:"library-loaded" AND library.path:("*.dylib")

🔗 References

📤 Share & Export