
In this episode of Cybersecurity Today, host Jim Love covers important security updates and warnings including critical flaws in WinRAR, a patch for a high severity zero-day vulnerability in Windows CLFS, and a security vulnerability in WhatsApp's...
Loading summary
Jim Love
Hey, are you in Calgary, Alberta? If you are BSIDES Calgary, a not for profit grassroots organization for information security professionals, hackers, coders, students and the broader tech community, is holding an in person event on May 1st and 2nd at the Bow Valley College. They've got workshops, community groups, cyber capture the flag and a diverse lineup of speakers attracting hundreds of attendees. I'll put a link in the show notes, but you can just Google BSIDES Calgary letter B S I D E S Calgary. I'm glad to give a shout out. Calgary is one of my favorite places and now back to our regularly scheduled Programming Critical flaws in a popular compression utility negate system defenses Microsoft patches critical zero day exploits, but not in Windows 10. WhatsApp users are urged to update due to security flaws and Happy Identity Management Day. This is Cybersecurity Today. I'm your host Jim Love. Security researchers are warning all Windows users to update WinRAR immediately after discovering two serious flaws that hackers may be exploiting in the wild. Winrar is one of the most widely used tools for compressing and extracting files with over 500 million users worldwide. But older versions before 6.23 contain bugs that can let attackers run malware on your computer just by getting you to open a malicious archive. One of the bugs, CVE202340477, involves a memory issue that lets hackers sneak past system defenses when a specially crafted recovery volume is opened. The other, CVE2023 38831, is also dangerous. It lets attackers hide malware in a zip file that looks safe. The flaw could allow attackers to bypass Windows mark of the web security warnings and won't be flagged in those cases and no warning would be given. We should always be using the latest version of any software. But just to provide added motivation, these types of flaws, while not being detected in the wild for this particular software yet, have been used in real world attacks. Google's Threat Analysis Group confirmed that state backed hackers have already used them to spread spyware like Dark Me and remote access tools like Remcos. The attack works by disguising dangerous code as regular documents or folders. Now these issues have been patched in the latest WinRAR version 7.11. You can download the latest version from win-rare.com and even if you think you're up to date, why don't you just go check? And remember to remind other people to update and that they need to go to the vendor site for the software. I could see some clever crook offering a malicious link to supposedly fix this. And while you're reminding people about fixing this or upgrading, it's also a good time to remind them that they still shouldn't open any zip file unless you know who sent it and what's in it. Microsoft has released a security update addressing a high severity zero day vulnerability in the Windows Common Log File System. CLFS that was actively exploited by the Ransom EXX ransomware group was tracked as CVE2025 29824. This use after free flaw allowed local attackers with low privileges to gain system level access without user interaction. The vulnerability should have been patched during the last patch Tuesday, with updates available for most affected Windows versions, however, and this might be important to you. Patches for Windows 10, X, 64 and 32 bit systems are still pending and will be released as soon as possible now this might be a part of a new trend of slower responses to key vulnerabilities in Windows 10. Just another nudge from Microsoft upgrade, but keep an eye open for this the Ransom Ex EX group exploited this flaw to target organizations across various sectors, including IT and real estate in the United States, the financial sector in Venezuela, a Spanish software company, and the retail sector in Saudi Arabia. The attackers deployed the pipemagic backdoor malware to facilitate the execution of ransomware payloads on compromised systems. A critical security vulnerability, identified as CVE2025.304.01 has been discovered in WhatsApp's Windows desktop application. This flaw could allow attackers to disguise malicious files as harmless attachments, potentially leading to unauthorized code execution on users systems. The issue arises from a mismatch in how WhatsApp for Windows handles file attachments. Specifically, the application displays incoming attachments based on their MIME type, a descriptor indicating the file's content type. However, when opening these attachments, WhatsApp relies on the file extension to determine the appropriate program to execute. This discrepancy allows an attacker to craft a file that appears to be benign but is in fact an executable file. If the user opens such a file within WhatsApp, it could lead to execution of malicious code without user knowledge. This vulnerability affects all versions of WhatsApp for Windows prior to 2.2450. Users are strongly advised to update their Application to version 2245 0.6 or later to mitigate the risk. But this flaw underscores a common tactic being used by attackers exploiting file attachments to deliver malicious content. Nico Chiraviglio, chief scientist at Zimperium, a mobile security solutions provider stated attachments remain one of the most common vectors for delivering malicious content. Just another reason to educate users about the risks associated with unsolicited file attachments. And of course, if they have to use these applications, Keeping them up to date now, you may have noticed that we rarely celebrate all of the various days that are out there, mostly because I'm blissfully unaware of them and I kind of think they're overdone. And besides, by the time I figure out what special day is happening, I've posted today's show. But someone reminded me that today is Identity Management Day. And more importantly, they sent me some data from a recent survey by Okta that started me to thinking the survey revealed that Canadians are increasingly worried about identity theft, but don't appear to be doing much about it. So maybe this Identity Management Day we can highlight Some of that data 72% of Canadians, according to this study, believe their identity will be stolen or used by someone else. Due to advancements in generative AI, 58% of Canadians are concerned about their identity being stolen, but only 21% feel confident in their ability to recognize AI generated attempts to compromise their information. So the good news? They're aware we have a problem. The bad news? What are we doing about it? Not enough. And especially at work, only 5% of Canadians appeared to be concerned about their work credentials and email leaving organizations exposed. 5% well, it's clear that the system is not working. Why not? Because they're bad people. 68% of Canadians feel overwhelmed by the sheer volume of online accounts they have. 37% of them experience monthly login failures due to forgotten credentials, and 18% say they face this ordeal weekly. Which takes us to the core of the issue. I've always said, and maybe this is dumb, that if there are no inconveniences, you probably don't have value in the security you're using. In other words, you have to do something different to protect yourself. And doing things differently is uncomfortable for us. But we can't ignore how overwhelmed people are. And even I'm often using choice words when I can't log in because of some new feature or some change. But as a security person, I have to suck it up and live with it. The average person might just try to find ways around inefficient or uncomfortable methods, or just resist their implementation. But now I know a reason why I don't pay attention to these special days. We have the insight, but we don't fix the issue. It's just like that thing every year where they come up and say password is the most frequent password. We admire the problem for a day, and then we move on to our next daily awareness issue. Something real's got to change. I'm thinking I'm going to do a special piece on new identity solutions. I want to dig more into this myself. It's going to be a weekend show, but you can help me out. Let me know what questions you might have and what would make that show more valuable to you. Because here's the present I'd like for Identity Management Day next year. I'd like to say we stopped admiring the problem. And that's our show for today. You can reach me at editorialechnewsday ca. You can find me on LinkedIn or you can if you're on YouTube, just leave a comment under the video. I'm your host, Jim Love. Thank thanks for listening.
Cybersecurity Today: Episode Summary
Episode: Critical Security Updates and Identity Management Insights
Host: Jim Love
Release Date: April 9, 2025
Jim Love kicks off the episode by alerting listeners to two significant vulnerabilities discovered in WinRAR, a widely used file compression tool with over 500 million users globally. These flaws, identified as CVE-2023-40477 and CVE-2023-38831, pose severe security risks:
CVE-2023-40477: This memory-related vulnerability allows attackers to bypass system defenses by exploiting a specially crafted recovery volume, potentially enabling the execution of malware when a malicious archive is opened.
CVE-2023-38831: This flaw permits attackers to conceal malware within ZIP files, effectively bypassing Windows' "mark of the web" security warnings. As a result, malicious files appear harmless, deceiving users into unwittingly executing harmful code.
Jim emphasizes the urgency of updating WinRAR, stating:
"We should always be using the latest version of any software... these types of flaws... have been used in real-world attacks." ([02:15])
He references Google's Threat Analysis Group, which has confirmed that state-backed hackers have exploited these vulnerabilities to distribute spyware like Dark Me and remote access tools such as Remcos. The latest WinRAR version 7.11 addresses these issues, and users are strongly encouraged to update immediately from the official website to avoid falling victim to these threats.
Jim transitions to Microsoft's recent security updates, highlighting a critical zero-day vulnerability in the Windows Common Log File System (CLFS), tracked as CVE-2025-29824. This "use-after-free" flaw has been actively exploited by the Ransom EXX ransomware group to gain system-level access without user interaction.
Key Points:
Jim notes a concerning trend:
"This might be part of a new trend of slower responses to key vulnerabilities in Windows 10." ([06:45])
Although patches were slated for the last Patch Tuesday, updates for certain Windows 10 versions are still pending, urging users to stay vigilant and ensure their systems are patched as soon as updates become available.
Addressing another significant security concern, Jim discusses a vulnerability in WhatsApp's Windows desktop application, identified as CVE-2025-304-01. This flaw allows attackers to craft malicious files that appear benign, exploiting discrepancies between MIME type handling and file extension execution within the app. Consequently, users might unknowingly execute harmful code by opening such deceptive attachments.
Key Highlights:
Jim underscores the importance of updating WhatsApp:
"Users are strongly advised to update their Application to version 2245.0.6 or later to mitigate the risk." ([12:20])
He further cites Nico Chiraviglio, Chief Scientist at Zimperium, emphasizing the pervasive threat of malicious attachments:
"Attachments remain one of the most common vectors for delivering malicious content." ([13:05])
The segment reinforces the critical need for user education on the risks of unsolicited file attachments and the importance of maintaining up-to-date software.
Jim shifts focus to Identity Management Day, using it as a platform to discuss findings from a recent Okta survey revealing Canadians' growing anxiety over identity theft juxtaposed with inadequate proactive measures.
Key Survey Insights:
Jim reflects on these findings:
"They are aware we have a problem. The bad news? What are we doing about it? Not enough." ([20:45])
He discusses the inherent challenges in balancing security and user convenience, acknowledging that overly stringent security measures can lead to user frustration and potential non-compliance.
Jim concludes this segment by expressing a commitment to exploring new identity solutions in future episodes, inviting listener participation to shape the upcoming discussion.
In his closing remarks, Jim reiterates the episode's key themes and encourages audience engagement for future discussions on identity management. He emphasizes the necessity of moving beyond awareness to actionable solutions to combat the escalating threats in cybersecurity.
Final Thoughts:
This episode of Cybersecurity Today adeptly navigates critical updates in software vulnerabilities and delves into the pressing issue of identity management amidst evolving cyber threats. Host Jim Love provides insightful analysis, underscored by expert opinions and actionable recommendations, making it an invaluable resource for individuals and organizations striving to bolster their cybersecurity posture.
Notable Quotes:
"We should always be using the latest version of any software... these types of flaws... have been used in real-world attacks." — Jim Love ([02:15])
"This might be part of a new trend of slower responses to key vulnerabilities in Windows 10." — Jim Love ([06:45])
"Attachments remain one of the most common vectors for delivering malicious content." — Nico Chiraviglio, Zimperium ([13:05])
"They are aware we have a problem. The bad news? What are we doing about it? Not enough." — Jim Love ([20:45])
Resources Mentioned: