Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeThreat LibraryVulnerabilities
CVE-2022-29072

CVE-2022-29072

Published: 2/20/2025

Written by: Monica Burgess

Red caution sign overlaid on a picture of a laptop with a hand on the trackpad
Glitch effectGlitch effect

What is CVE-2022-29072?

CVE-2022-29072 refers to a critical security flaw in the widely used open-source file archiver, 7-Zip. It's an arbitrary code execution (ACE) vulnerability, specifically a heap overflow. In plain English, a threat actor can create a booby-trapped archive file. When an unsuspecting user opens this file with a vulnerable version of 7-Zip, the attacker can execute commands on their machine. This flaw gives attackers a direct line into a system, paving the way for data theft, malware installation, or a complete takeover.

When was it discovered?

This particular vulnerability, tracked as CVE-2022-29072, came to light in 2022. The discovery wasn't just a theoretical exercise; researchers quickly developed a proof of concept (PoC) that demonstrated the exploitability of the flaw. This PoC made the threat tangible, sending a clear signal to millions of users and IT admins that it was time to update their software, and fast.

Affected Products & Versions

The good news? This isn't a zero-day with no fix. The bad news is that if you're running an older version of 7-Zip, your systems are sitting ducks. The 7-Zip patch has been available for a while, so there's no excuse for staying vulnerable.

Product

Versions Affected

Fixed Versions / Patch Links

7-Zip

All versions prior to 22.01

7-Zip 22.01 and later

CVE-2022-29072 Technical Description

Let's get into the technical details of CVE-2022-29072. The flaw exists in the way the 7-Zip application handles .7z archives. By dragging a file with a .7z extension onto the 7z.exe Help > Contents area, an attacker can trigger a heap overflow. This memory corruption bug allows the attacker to execute code with the same privileges as the user running the application. The high exploitability comes from its reliance on a simple, common user action, making it a dangerous entry point for attackers.

Tactics, Techniques & Procedures (TTPs)

Attackers love using what works, and for this CVE-2022-29072 exploit, the playbook is straightforward.

  • Initial Access: A threat actor crafts a phishing email containing the malicious .7z file. The email is often disguised as something urgent or official, like an invoice or a project update, to trick the user into opening it.

  • Execution: The user downloads the file and, through a simple drag-and-drop action, triggers the exploit within the vulnerable 7-Zip application.

  • Action on Objectives: Once the exploit code runs, the attacker's payload is executed. This could be anything from installing ransomware or spyware to establishing a connection with a command-and-control (C2) server for long-term access.

Indicators of Compromise (IOCs)

Detecting a CVE-2022-29072 IOC requires looking for the aftermath of the exploit. Since the initial compromise happens locally, you need to watch for unusual system behavior.

  • Suspicious child processes spawning from 7z.exe or 7zG.exe, especially cmd.exe or powershell.exe.

  • Unexpected network traffic to unknown IP addresses or domains shortly after a user interacts with a .7z file.

  • The creation of strange files or scripts in user directories or temporary folders.

  • Alerts from endpoint security tools flagging malicious activity originating from a 7-Zip process. Monitoring these CVE-2022-29072 indicators of compromise is key.

Known Proof-of-Concepts & Exploits

Shortly after the vulnerability's disclosure, a CVE-2022-29072 proof of concept was made public. While helpful for defenders looking to build detections, this also significantly lowered the barrier for attackers. The PoC confirmed the exploitability of the vulnerability, and it's a safe bet that threat actors have incorporated this CVE-2022-29072 exploit into their arsenals. It is a known and weaponized threat.

How to Detect CVE-2022-29072

A solid CVE-2022-29072 detection strategy requires multiple layers.

  • Signature-Based Tools: Your antivirus might catch known malicious .7z files, but attackers can easily alter file hashes to bypass these simple checks.

  • Behavioral Analysis: This is where modern security shines. An Endpoint Detection and Response (EDR) solution is designed to spot abnormal behavior. If 7z.exe suddenly attempts to execute PowerShell scripts or connect to a random IP, a good EDR will flag it immediately.

  • Log Monitoring: Continuously monitor process execution logs. If you see 7z.exe launching command prompts, it's a major red flag that warrants an investigation. This kind of vigilance is a cornerstone of an effective ITDR (Identity Threat Detection and Response) program.

Mitigation & Remediation Strategies

Now for the important part: how to protect your organization. The primary CVE-2022-29072 mitigation strategy is straightforward.

  • Patch Immediately!: Stop everything and ensure all installations of 7-Zip across your environment are updated to version 22.01 or later. Use a patch management system to automate this. Applying the official 7-Zip patch is the single most effective thing you can do. Beyond patching, implement these additional security measures:

  • User Education: Your team is your first line of defense. Train them to recognize and report suspicious emails and attachments. A strong Security Awareness Training (SAT) program can make all the difference.

  • Enforce Least Privilege: Users should not have administrative rights unless absolutely necessary. While this won't stop the initial exploit, it severely limits an attacker's ability to escalate privileges and move laterally through your network.

  • Deploy a Managed EDR: You can't have eyes on every endpoint 24/7, but a managed security platform can. A solution like Huntress actively monitors for suspicious behaviors, detects threats that bypass traditional antivirus, and provides the context your team needs to respond swiftly.

This CVE-2022-29072 is a stark reminder that even the most trusted tools can be turned against you. Stay vigilant, keep your software updated, and arm your organization with the right defenses.

CVE-2022-29072 FAQs

CVE-2022-29072 is a security flaw that allows an attacker to run arbitrary code on a victim's machine. It works by exploiting a heap overflow issue. An attacker tricks a user into opening a specially crafted .7z file, which triggers the exploit and gives the attacker control.

Infection typically starts with a phishing email containing a malicious .7z attachment. When a user with a vulnerable version of 7-Zip interacts with the file (e.g., via drag-and-drop into the Help section), the exploit is triggered, and the system is compromised.

Yes, it absolutely remains a threat. Any organization running unpatched versions of 7-Zip is still at risk. As long as vulnerable software exists in an environment, attackers will continue to exploit it.

The most critical step is to apply the 7-Zip patch, updating all instances to version 22.01 or later. Additionally, organizations should implement security awareness training to help users spot phishing attempts and deploy an EDR solution to detect and respond to post-exploit activity.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy