search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Retraction of "Antivirus and Endpoint Detection and Response Archive Scanning Engines may not properly scan malformed ZIP archives"

Vulnerability Note VU#976247

Original Release Date: 2026-03-09 | Last Revised: 2026-03-24

Overview

Malformed ZIP headers can be used to obfuscate malicious content in ZIP files from antivirus detection tools. Despite the presence of malformed headers, custom extraction software can decompress the ZIP archive, allowing potentially malicious payloads to be recovered after successful antivirus evasion.

After a review of the researcher's published PoC and further analysis of the case, we have determined that this issue does not meet the necessary criteria to be considered a vulnerability. The originally reported behavior was based on a misunderstanding of native archive-handling capabilities in common operating systems such as Windows and Linux. It was initially believed that native extraction tools could successfully decompress ZIP files with malformed headers, while EDRs and antivirus security tools would fail. After additional testing, we have determined that extraction is not possible through standard archiving tools, and recovering the payload would instead require a custom loader. Accordingly, this technique can be more accurately described as an obfuscation method, as it does not meaningfully violate any implicit or explicit security boundaries.

Description

ZIP archives contain metadata such as compression method, flags, and version information. Antivirus engines typically rely on this metadata to determine how to preprocess files before scanning. If an attacker modifies the compression-method header field, antivirus software may fail to properly decompress the file and will, therefore, be unable to analyze the actual payload.

After antivirus evasion, the payload can be recovered by using a custom loader that ignores the declared Method field and instead decompresses embedded data directly. This allows an attacker to hide malicious content from antivirus engines while still being able to recover it programmatically.

Notably, standard extraction tools (e.g. 7‑Zip, unzip, bsdtar, Python’s zipfile) trust the declared compression method and attempt decompression but then fail with CRC or “unsupported method” errors. These tools do not extract the payload and do not expose the underlying data.

This vulnerability is similar to VU#968818, CVE-2004-0935 but requires unique unpacking tools to enable any abuse or misuse.

Impact

This ZIP header obfuscation method requires custom tooling to fully recover the concealed malicious content. The impact of this obfuscation technique is limited to systems where other security policies (e.g., running arbitrary unzipping tools) may need to be bypassed to enable such an attack.

Solution

Antivirus and EDR vendors should consider alerting on such behavior to ensure their customers are aware of malformed headers in zip content. Users should not use third-party tools or custom unzip capabilities to allow malicious content to be installed on their systems.

Acknowledgements

Thanks to the reporter, Christopher Aziz. This document was written by Laurie Tyzenhaus.

Vendor Information

976247
 

Cisco Unknown

Notified:  2026-01-14 Updated: 2026-03-09

Statement Date:   February 24, 2026

Vendor Statement

It has been confirmed that ClamAV is unable to scan this type of malformed zip file. However, this is not considered a vulnerability, but rather, a hardening suggestion. It will be taken into consideration for future releases.

References

AhnLab Inc Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Avast Antivirus Software Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

AVG Anti-virus Software Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Avira Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Baidu Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Bitdefender Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Bloxx Ltd Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

BullGuard Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Cloudmark Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

COMODO Security Solutions, Inc. Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

ESET LLC. Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Fortinet Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

F-PROT AVS by Frisk Software International Inc. Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

F-Secure Corporation Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

G DATA Software AG Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Google Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

K7 Computing Private Limited Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Lavasoft Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

McAfee Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Microsoft Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Panda Software Ltd. Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Quick Heal Software Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Rising Antivirus International Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

SmoothWall Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Sophos Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Symantec Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Trellix Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

Trend Micro Unknown

Notified:  2026-01-12 Updated: 2026-03-09

Vendor Statement

We have not received a statement from the vendor.

View all 29 vendors View less vendors


Other Information

API URL: VINCE JSON | CSAF
Date Public: 2004-12-10
Date First Published: 2026-03-09
Date Last Updated: 2026-03-24 20:27 UTC
Document Revision: 4

Sponsored by CISA.