7-Zippin’ My Way To Admin

Share This Post

A new zero-day vulnerability (CVE-2022-29072) has been discovered allowing easy privilege escalation and command execution. A simple drag and drop is all that is needed to complete this. Researchers have found when a file with the .7z extension is dragged to the Help>Contents area it causes a heap overflow in 7zFM.exe which results in privilege escalation (usually to Admin). 7zip has yet to patch the vulnerability however two known mitigations are available:

  1. Deleting the 7-zip.chm file.
  2. 7-zip should only be allowed to have read and run permissions for all users.

However it must be noted that this vulnerability is disputed as of writing this article.

Links: https://github.com/sentinelblue/CVE-2022-29072

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29072



Reach out to our incident response team for help

More To Explore

Information Security News – 11/10/2025

You’ll Never Guess What the Most Common Passwords Are. Oh, Wait, Yes You Will Article Link: https://www.theregister.com/2025/11/06/most_common_passwords/ The Louvre’s Video Security Password Was Reportedly ‘Louvre’

Information Security News – 11/3/2025

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Article Link: https://thehackernews.com/2025/10/cisa-and-nsa-issue-urgent-guidance-to.html U.S. Stands Out in Refusal to Sign UN Cybercrime Treaty

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.