search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Antivirus and Endpoint Detection and Response Archive Scanning Engines may not properly scan malformed zip archives

Vulnerability Note VU#976247

Original Release Date: 2026-03-09 | Last Revised: 2026-03-09

Overview

Malformed ZIP headers can cause antivirus and endpoint detection and response software (EDR) to produce false negatives. Despite the presence of malformed headers, some extraction software is still able to decompress the ZIP archive, allowing potentially malicious payloads to run upon file decompression.

Description

ZIP archives contain metadata such as compression method, flags, and version information. Antivirus engines typically rely on this metadata to determine how to preprocess files before scanning. If an attacker modifies the compression method field, antivirus software may fail to properly decompress the file, and will therefore be unable to analyze the actual payload.

After antivirus evasion, the payload can be recovered by using a custom loader that ignores the declared Method field and instead decompresses embedded data directly. This allows the attacker to hide malicious content from antivirus engines while still being able to recover it programmatically.

Notably, standard extraction tools (e.g.: 7‑Zip, unzip, bsdtar, Python’s zipfile) trust the declared compression method and attempt decompression, but then fail with CRC or “unsupported method” errors. These tools do not extract the payload and do not expose the underlying data.

This vulnerability is similar to VU#968818, CVE-2004-0935.

Impact

A remote attacker may craft a ZIP archive with tampered metadata that prevents antivirus or EDR software from properly decompressing and inspecting its contents. The file can thereby evade full analysis, though many products will still flag it as corrupted. To execute malicious code, however, a user must extract or further process the archive. Standard extraction tools may or may not reveal the hidden payload. It is possible that a custom loader that ignores the declared compression method could recover and execute the concealed content.

Solution

Antivirus and EDR vendors should not rely solely on declared archive metadata to determine content handling. Scanners should have more aggressive detection modes to validate compression method fields against actual content characteristics, and flag inconsistencies for further inspection. Users are encouraged to contact their antivirus or EDR providers to identify whether they are vulnerable and obtain guidance on additional mitigation options.

Acknowledgements

Thanks to the reporter, Christopher Aziz. This document was written by Laurie Tyzenhaus.

Vendor Information

976247
 

Cisco Affected

Notified:  2026-01-14 Updated: 2026-03-09

Statement Date:   February 24, 2026

CVE-2026-0866 Affected

Vendor Statement

It has been confirmed that ClamAV is unable to scan this type of malformed zip file. However, this is not considered a vulnerability, but rather, a hardening suggestion. It will be taken into consideration for future releases.

References

AhnLab Inc Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Avast Antivirus Software Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

AVG Anti-virus Software Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Avira Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Baidu Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Bitdefender Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Bloxx Ltd Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

BullGuard Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Cloudmark Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

COMODO Security Solutions, Inc. Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

ESET LLC. Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Fortinet Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

F-PROT AVS by Frisk Software International Inc. Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

F-Secure Corporation Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

G DATA Software AG Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Google Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

K7 Computing Private Limited Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Lavasoft Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

McAfee Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Microsoft Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Panda Software Ltd. Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Quick Heal Software Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Rising Antivirus International Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

SmoothWall Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Sophos Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Symantec Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Trellix Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

Trend Micro Unknown

Notified:  2026-01-12 Updated: 2026-03-09

CVE-2026-0866 Unknown

Vendor Statement

We have not received a statement from the vendor.

View all 29 vendors View less vendors


Other Information

CVE IDs: CVE-2026-0866
API URL: VINCE JSON | CSAF
Date Public: 2004-12-10
Date First Published: 2026-03-09
Date Last Updated: 2026-03-09 16:09 UTC
Document Revision: 1

Sponsored by CISA.