Description
PassFab RAR Password Recovery 9.3.2 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a payload with a buffer overflow, NSEH jump, and shellcode, then paste it into the 'Licensed E-mail and Registration Code' field during registration to trigger code execution.
Published: 2026-03-26
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Code Execution
Action: Immediate Patch
AI Analysis

Impact

PassFab RAR Password Recovery 9.3.2 contains a structured exception handler buffer overflow that allows a local attacker to execute arbitrary code. By injecting a specially crafted payload into the 'Licensed E‑mail and Registration Code' field when registering, the attacker can overflow the SEH pointer, redirect execution to malicious shellcode, and gain programmatic control over the process. This vulnerability gives the attacker the same privileges as the user running the software, potentially allowing full system compromise. The weakness is a classic out‑of‑bounds write (CWE‑787).

Affected Systems

Affected is the Passfab RAR Password Recovery application, specifically version 9.3.2. The CPE data confirms that the vulnerability exists only in this exact version. No other version ranges are listed, so earlier or later renditions may not be impacted, but the official CNA product name is Passfab:RAR Password Recovery and the CPE indicates9.3.2 as the vulnerable release.

Risk and Exploitability

The CVSS base score is 8.6, classifying it as high severity. The EPSS score is below 1 %, indicating a low probability of exploitation in the wild, and it has not been catalogued in CISA’s KEV list. The attack vector is local; an attacker must be able to run the program and provide input in the registration field. Because the flaw permits arbitrary code execution, the risk includes full control over the local machine. Administrators should treat it as a critical vulnerability when considering users who run the software with elevated privileges.

Generated by OpenCVE AI on March 31, 2026 at 16:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check PassFab’s website for a security patch and install the latest release immediately.
  • If no patch is available, avoid using the vulnerable product or disable the registration input to mitigate exploitation.
  • Run the application only under a non‑administrative user account and monitor for anomalous activity.

Generated by OpenCVE AI on March 31, 2026 at 16:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:passfab:rar_password_recovery:*:*:*:*:*:*:*:*

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Passfab
Passfab rar Password Recovery
Vendors & Products Passfab
Passfab rar Password Recovery

Thu, 26 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description PassFab RAR Password Recovery 9.3.2 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a payload with a buffer overflow, NSEH jump, and shellcode, then paste it into the 'Licensed E-mail and Registration Code' field during registration to trigger code execution.
Title PassFab RAR Password Recovery 9.3.2 SEH Buffer Overflow
First Time appeared Krylack
Krylack rar Password Recovery
Weaknesses CWE-787
CPEs cpe:2.3:a:krylack:rar_password_recovery:9.3.2:*:*:*:*:*:*:*
Vendors & Products Krylack
Krylack rar Password Recovery
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Krylack Rar Password Recovery
Passfab Rar Password Recovery
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-28T02:19:51.015Z

Reserved: 2026-03-26T13:17:49.382Z

Link: CVE-2018-25218

cve-icon Vulnrichment

Updated: 2026-03-28T02:19:47.118Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T14:16:05.900

Modified: 2026-03-31T15:08:51.733

Link: CVE-2018-25218

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:09:07Z

Weaknesses