PT-2025-10816 · Microsoft · Windows File Explorer +1

Skorikari

+1

·

Published

2025-03-11

·

Updated

2025-08-30

·

CVE-2025-24071

CVSS v2.0
7.8
VectorAV:N/AC:L/Au:N/C:C/I:N/A:N

Name of the Vulnerable Software and Affected Versions:

Windows 10 Version 1809 version 10.0.17763.0

Description:

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. This occurs when a specially crafted .library-ms file containing an SMB path is compressed within a RAR/ZIP archive and subsequently extracted. Windows Explorer automatically parses the contents of this file, leading to NTLM hash disclosure. The user does not need to open or execute the file; simply extracting it is enough to trigger the vulnerability. This issue is actively being exploited in the wild and has potentially been offered for sale on the darknet.

Recommendations:

Update Windows to the latest version to patch the vulnerability.

As a temporary workaround, consider disabling the automatic parsing of .library-ms files in Windows Explorer to prevent NTLM hash disclosure.

Restrict access to SMB servers and limit the use of RAR/ZIP archives from untrusted sources to minimize the risk of exploitation.

Exploit

Fix

Information Disclosure

Weakness Enumeration

Related Identifiers

BDU:2025-02757
CVE-2025-24071

Affected Products

Windows
Windows File Explorer