WinRAR < 7.00 Multiple Vulnerabilities

medium Nessus Plugin ID 192940


The remote Windows host has an application installed which is affected by multiple vulnerabilities.


The remote host is running WinRAR, an archive manager for Windows, whose reported version is prior to 7.00. It is, therefore, affected by multiple vulnerabilties:

- The vulnerability exists due to an error within the archive extraction functionality. A remote attacker can use a specially crafted archive to bypass the Mark-Of-The-Web protection mechanism and potentially compromise the affected system. (CVE-2024-30370)

- RARLAB WinRAR before 7.00, on Windows, allows attackers to spoof the screen output via ANSI escape sequences, a different issue than CVE-2024-33899. (CVE-2024-36052)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to WinRAR version 7.00 or later.

See Also

Plugin Details

Severity: Medium

ID: 192940

File Name: winrar_700.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 4/5/2024

Updated: 5/24/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2024-30370


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:rarlab:winrar

Required KB Items: SMB/Registry/Enumerated, installed_sw/RARLAB WinRAR

Exploit Ease: No known exploits are available

Patch Publication Date: 4/1/2024

Vulnerability Publication Date: 4/1/2024

Reference Information

CVE: CVE-2024-30370, CVE-2024-36052

IAVA: 2024-A-0194-S, 2024-A-0303