PT-2025-10806 · Microsoft · Windows Ntlm +1
J00Sean
+1
·
Published
2025-03-11
·
Updated
2025-08-31
·
CVE-2025-24054
7.8
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:N/A:N |
**Name of the Vulnerable Software and Affected Versions:**
Microsoft Windows (affected versions not specified)
**Description:**
A vulnerability exists in the Windows NTLM (NT LAN Manager) protocol due to external control of file names or paths. This allows an unauthorized attacker to perform spoofing over a network. The vulnerability enables the theft of NTLM credentials with minimal user interaction, such as simply previewing a malicious file. Exploitation involves a crafted `.library-ms` file triggering SMB authentication to a controlled server, leading to NTLM hash leakage. This vulnerability is actively exploited in the wild, with campaigns targeting government and private organizations in multiple countries, including Poland, Romania, Russia, Bulgaria, the Netherlands, Australia, and Turkey. Approximately 10 attack campaigns have been observed as of late March 2025.
**Recommendations:**
Versions prior to the March 11, 2025 update are vulnerable.
* Apply the March 11, 2025, or later updates.
* Disable NTLM if it is not needed.
* Restrict access to the vulnerable module `File Explorer` to minimize the risk of exploitation.
* Monitor for suspicious SMB authentication requests.
* Audit file shares.
Exploit
Fix
Weakness Enumeration
Related Identifiers
Affected Products
References · 266
- 🔥 https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC⭐ 9 🔗 1 · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-detection-script · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-24054 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24054 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-02760 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24054 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054 · Vendor Advisory
- https://twitter.com/adriananglin/status/1913491125194666393 · Twitter Post
- https://twitter.com/gossy_84/status/1913132951597892020 · Twitter Post
- https://twitter.com/pigram86/status/1913093457951813896 · Twitter Post
- https://twitter.com/helpnetsecurity/status/1912846664806658260 · Twitter Post
- https://t.me/aptreports/17889 · Telegram Post
- https://twitter.com/cheinyeanlim/status/1915561126982803964 · Twitter Post
- https://twitter.com/hyp3rlinx/status/1915897231028502811 · Twitter Post
- https://twitter.com/Visuality_NQ/status/1914301521187004817 · Twitter Post