PT-2025-10806 · Microsoft · Windows Ntlm +1
J00Sean
+1
·
Published
2025-03-11
·
Updated
2025-10-20
·
CVE-2025-24054
CVSS v2.0
7.8
7.8
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions prior to the March 2025 security update
Description
This issue is a Windows New Technology LAN Manager (NTLM) hash disclosure spoofing vulnerability (CVE-2025-24054). Exploitation occurs through maliciously crafted .library-ms files, allowing attackers to steal NTLM credentials with minimal user interaction, sometimes only requiring a file download. The vulnerability has been actively exploited in attacks targeting government and private institutions in Poland, Romania, and globally. Threat actors, potentially including the APT28 group, are leveraging this flaw. The vulnerability allows attackers to perform spoofing over a network by exploiting external control of file names or paths. Approximately 10 attack campaigns have been observed as of late March 2025, with malicious SMB servers located in Russia, Bulgaria, the Netherlands, Australia, and Turkey. The vulnerability was initially rated as low risk by Microsoft, but is now considered critical due to its ease of exploitation and potential impact.
Recommendations
Apply the March 2025 security update immediately.
Disable NTLM authentication if it is not required.
Monitor network traffic for suspicious SMB authentication requests.
Audit file shares for malicious .library-ms files.
Exploit
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-02760
CVE-2025-24054
Affected Products
Windows
Windows Ntlm
References · 278
- 🔥 https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC⭐ 9 🔗 1 · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-detection-script · Exploit
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24054 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24054 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-24054 · Security Note
- https://bdu.fstec.ru/vul/2025-02760 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054 · Vendor Advisory
- https://reddit.com/r/cybersecurityexams/comments/1k1ypzn/cve202524054_windows_vulnerability_exploited_to · Reddit Post
- https://twitter.com/dCypherIO/status/1913200843056431242 · Twitter Post
- https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild · Reddit Post
- https://t.me/malwr/9443 · Telegram Post
- https://twitter.com/transilienceai/status/1913920767923834901 · Twitter Post
- https://twitter.com/liontarakos/status/1913495762459050073 · Twitter Post
- https://twitter.com/bountywriteups/status/1913308187207270686 · Twitter Post
- https://twitter.com/_myfox_/status/1913219790669332988 · Twitter Post