Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-26623 : Security Advisory and Response

Discover the details of CVE-2021-26623, a high-severity remote code execution vulnerability in Bandizip by Bandisoft International Inc. Learn about the impact, affected systems, and mitigation strategies.

Bandisoft International Inc.'s Bandizip on Windows versions less than or equal to 7.19 is affected by a remote code execution vulnerability. The flaw exists due to an incomplete check for the 'xheader_decode_path_record' function's parameter length value in the ark library, allowing remote attackers to exploit it to induce malicious code execution.

Understanding CVE-2021-26623

This section provides insights into the nature and impact of the Bandisoft ARK Library Out-of-bound Vulnerability.

What is CVE-2021-26623?

CVE-2021-26623 refers to a remote code execution vulnerability in Bandizip on Windows versions less than or equal to 7.19. The issue stems from an inadequate parameter length value check in the ark library's 'xheader_decode_path_record' function.

The Impact of CVE-2021-26623

The vulnerability poses a high risk with a CVSS base score of 7.8. Attackers can leverage this flaw to execute arbitrary code remotely, potentially leading to data breaches, tampering, or denial of service.

Technical Details of CVE-2021-26623

Delve into the specifics surrounding the vulnerability's technical aspects.

Vulnerability Description

The vulnerability arises from lacking proper input validation in the 'xheader_decode_path_record' function, allowing threat actors to craft and deploy malicious code payloads.

Affected Systems and Versions

Bandizip software running on Windows versions up to 7.19 are susceptible to this vulnerability.

Exploitation Mechanism

Remote attackers can exploit this flaw by manipulating the parameter length value in the 'xheader_decode_path_record' function, enabling the execution of arbitrary code.

Mitigation and Prevention

Explore strategies to mitigate and prevent the exploitation of CVE-2021-26623.

Immediate Steps to Take

Users are advised to update Bandizip to a secure version beyond 7.19 or consider alternative archive software until a patch is available.

Long-Term Security Practices

Implement robust cybersecurity measures, such as network segmentation, least privilege access, and regular security audits to fortify your systems.

Patching and Updates

Stay vigilant for security advisories from Bandisoft International Inc. and promptly apply patches to address known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now