CVE-2025-63372

4.3 MEDIUM

📋 TL;DR

Articentgroup Zip Rar Extractor Tool 1.345.93.0 contains a directory traversal vulnerability in its ZIP file processing component. Attackers can exploit this to write files outside the intended extraction directory, potentially overwriting system files or placing malicious executables. Users of this specific version are affected.

💻 Affected Systems

Products:
  • Articentgroup Zip Rar Extractor Tool
Versions: 1.345.93.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation. Only affects systems where this specific version is installed and used to extract ZIP files from untrusted sources.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via overwriting critical system files or placing backdoors in startup locations, leading to remote code execution with the privileges of the application user.

🟠

Likely Case

Local file overwrite leading to data corruption, denial of service, or limited privilege escalation if the application runs with elevated permissions.

🟢

If Mitigated

Limited to writing files within the user's own directory space if proper sandboxing and file permission restrictions are enforced.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to open a malicious ZIP file. The vulnerability is straightforward to exploit once a malicious archive is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://articentgroup.com/zip-rar-extractor-tool/

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. If patch is available, download and install the updated version. 3. Verify the version number after installation.

🔧 Temporary Workarounds

Disable ZIP extraction functionality

windows

Prevent the tool from processing ZIP files entirely to block exploitation vectors.

Run with restricted permissions

windows

Configure the application to run with limited user privileges to reduce impact of successful exploitation.

🧯 If You Can't Patch

  • Uninstall Articentgroup Zip Rar Extractor Tool 1.345.93.0 and use alternative archive software.
  • Implement application whitelisting to prevent execution of unauthorized files that might be placed via exploitation.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Articentgroup Zip Rar Extractor Tool via Windows Programs and Features or the application's About dialog.

Check Version:

Not available - check via GUI or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Articentgroup\ZipRarExtractor

Verify Fix Applied:

Verify the version number is no longer 1.345.93.0 after applying any vendor update.

📡 Detection & Monitoring

Log Indicators:

  • File write operations outside expected extraction directories
  • Process creation from unusual locations after ZIP extraction

Network Indicators:

  • Downloads of ZIP files followed by suspicious file system activity

SIEM Query:

Process creation where parent process is zip extraction tool AND target path contains '..' sequences

🔗 References

📤 Share & Export