WinRAR < 6.23 RCE

high Nessus Plugin ID 180174


The remote Windows host has an application installed which is affected by a remote code execution vulnerability.


The remote host is running WinRAR, an archive manager for Windows.

The version of WinRAR installed on the remote host is affected by a an improper validation of user-supplied data, which can result in memory access past the end of an allocated buffer which can be exploited remotely and may allow attackers to execute code in the context of the current process.


Upgrade to WinRAR version 6.23 or later.

See Also

Plugin Details

Severity: High

ID: 180174

File Name: winrar_623.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 8/24/2023

Updated: 5/3/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Critical

Score: 9.7


Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-40477


Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2023-38831

Vulnerability Information

CPE: cpe:/a:rarlab:winrar

Required KB Items: installed_sw/RARLAB WinRAR, SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/17/2023

Vulnerability Publication Date: 8/17/2023

CISA Known Exploited Vulnerability Due Dates: 9/14/2023

Exploitable With

Core Impact

Metasploit (WinRAR CVE-2023-38831 Exploit)

Reference Information

CVE: CVE-2023-38831, CVE-2023-40477

IAVA: 2023-A-0436-S