CVE-2025-14111
📋 TL;DR
This CVE describes a path traversal vulnerability in Rarlab RAR App for Android that allows attackers to read or write arbitrary files remotely. Only Android versions up to 7.11 Build 127 are affected, with WinRAR and Unix RAR versions being unaffected. Successful exploitation could lead to data theft or system compromise.
💻 Affected Systems
- Rarlab RAR App for Android
📦 What is this software?
Rar by Rarlab
⚠️ Risk & Real-World Impact
Worst Case
Remote attacker gains full control of the Android device, accesses sensitive files, or installs malware through arbitrary file writes.
Likely Case
Data exfiltration of user files or limited file system manipulation due to Android sandboxing and exploit complexity.
If Mitigated
No impact if patched version is installed or app is removed from vulnerable devices.
🎯 Exploit Status
Exploit has been publicly disclosed but requires complex attack chain. Remote exploitation is possible but difficult.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.20 build 128
Vendor Advisory: https://www.rarlab.com/rarnew.htm
Restart Required: No
Instructions:
1. Open Google Play Store on Android device. 2. Search for 'RAR'. 3. If update is available, tap 'Update'. 4. Verify version is 7.20 build 128 or higher.
🔧 Temporary Workarounds
Uninstall vulnerable app
androidRemove RAR app from Android devices until patched version can be installed
Settings > Apps > RAR > Uninstall
Restrict app permissions
androidLimit RAR app's access to storage and files
Settings > Apps > RAR > Permissions > Deny Storage access
🧯 If You Can't Patch
- Remove RAR app from all Android devices and use alternative archive tools
- Implement mobile device management (MDM) policies to block RAR app installation
🔍 How to Verify
Check if Vulnerable:
Check RAR app version in Android Settings > Apps > RAR > App info
Check Version:
Not applicable - check via Android UI or app info
Verify Fix Applied:
Confirm version is 7.20 build 128 or higher in app settings
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns from RAR app
- Multiple failed file operations
Network Indicators:
- Suspicious network traffic from RAR app to external IPs
SIEM Query:
source="android_device" app="com.rarlab.rar" (event="file_access" OR event="permission_violation")
🔗 References
- https://github.com/Secsys-FDU/AF_CVEs/blob/main/com.rarlab.rar/RAR%20APP%20Arbitrary%20File%20Write%20and%20Read%20Vulnerability.md
- https://vuldb.com/?ctiid.334491
- https://vuldb.com/?id.334491
- https://vuldb.com/?submit.697375
- https://github.com/Secsys-FDU/AF_CVEs/blob/main/com.rarlab.rar/RAR%20APP%20Arbitrary%20File%20Write%20and%20Read%20Vulnerability.md