Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8811: CWE-693: Protection Mechanism Failure in WinZip Computing WinZip

0
High
VulnerabilityCVE-2024-8811cvecve-2024-8811cwe-693
Published: Fri Nov 22 2024 (11/22/2024, 21:03:11 UTC)
Source: CVE Database V5
Vendor/Project: WinZip Computing
Product: WinZip

Description

WinZip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archive files. When opening an archive that bears the Mark-of-the-Web, WinZip removes the Mark-of-the-Web from the archive file. Following extraction, the extracted files also lack the Mark-of-the-Web. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23983.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 16:23:04 UTC

Technical Analysis

CVE-2024-8811 is a protection mechanism failure vulnerability classified under CWE-693 affecting WinZip Computing's WinZip product, specifically version 28.0 (15640) 64-bit. The vulnerability involves improper handling of the Mark-of-the-Web (MotW) security feature, which is designed to warn users and restrict execution of files downloaded from untrusted sources, such as the internet. When a user opens an archive file marked with MotW, WinZip erroneously strips the MotW attribute from the archive and consequently from all extracted files. This removal disables the security warnings and restrictions normally enforced by MotW, effectively bypassing this protection mechanism. An attacker can craft a malicious archive that, when opened by a user, results in extracted files that appear safe and can execute arbitrary code under the current user's context. Exploitation requires user interaction—specifically, opening a malicious archive or visiting a malicious webpage that triggers the archive extraction. The vulnerability has a CVSS v3.0 base score of 7.8, reflecting high severity due to its potential to compromise confidentiality, integrity, and availability without requiring privileges or complex attack conditions. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to users and organizations relying on WinZip for archive management.

Potential Impact

The primary impact of CVE-2024-8811 is the potential for arbitrary code execution with the privileges of the current user, which can lead to full compromise of affected systems. By bypassing the Mark-of-the-Web protection, attackers can deliver malicious payloads disguised as benign files extracted from archives, increasing the likelihood of successful social engineering attacks. This can result in data theft, installation of malware or ransomware, unauthorized system modifications, and disruption of services. Since the vulnerability affects a widely used file compression tool, organizations globally that rely on WinZip for handling archives are at risk. The attack requires user interaction but can be triggered via common user activities such as opening email attachments or downloading files from the internet, making it a practical vector for attackers. The compromise of user-level accounts can also serve as a foothold for lateral movement within enterprise networks, especially if combined with other vulnerabilities or misconfigurations.

Mitigation Recommendations

To mitigate CVE-2024-8811, organizations should first verify if they are using the affected version of WinZip (28.0 (15640) 64-bit) and upgrade to a patched version once available. In the absence of an official patch, users should avoid opening archive files from untrusted or unknown sources. Implement strict email filtering and attachment scanning to reduce the risk of malicious archives reaching end users. Employ endpoint protection solutions capable of detecting and blocking suspicious archive extraction behaviors. Educate users about the risks of opening unsolicited archives and the importance of verifying file origins. Additionally, consider enforcing application whitelisting and restricting execution of files in user download or temporary directories where extracted files typically reside. Monitoring for unusual process behaviors related to WinZip or archive extraction can also help detect exploitation attempts early. Finally, coordinate with WinZip Computing for updates and advisories to ensure timely application of security patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-09-13T18:05:09.514Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6b34b7ef31ef0b54f473

Added to database: 2/25/2026, 9:35:48 PM

Last enriched: 2/27/2026, 4:23:04 PM

Last updated: 4/12/2026, 9:29:48 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses