Wednesday, March 19, 2025
Homecyber securityMicrosoft Windows NTLM File Explorer Vulnerability Exploited in The Wild - PoC...

Microsoft Windows NTLM File Explorer Vulnerability Exploited in The Wild – PoC Released

Published on

SIEM as a Service

Follow Us on Google News

A significant vulnerability in Microsoft Windows File Explorer, identified as CVE-2025-24071, has been discovered and is being actively exploited in the wild.

This vulnerability allows attackers to capture NTLM hashes, potentially leading to network spoofing attacks and credential theft.

The exploit involves specially crafted .library-ms files embedded within compressed archives like RAR or ZIP.

When these files are extracted, Windows Explorer automatically processes them, initiating an NTLM authentication handshake with an attacker-controlled SMB server without requiring user interaction.

Windows NTLM
forum post

Technical Explanation of NTLM Hash Leak

The .library-ms file format is XML-based and trusted by Windows Explorer to define search and library locations.

When a specially crafted .library-ms file containing an SMB path is extracted from a compressed archive, Windows Explorer attempts to resolve this path automatically to gather metadata and index file information.

This action triggers an implicit NTLM authentication handshake from the victim’s system to the attacker-controlled SMB server, leaking the victim’s NTLMv2 hash without explicit user interaction.

The vulnerability exploits Windows Explorer’s automatic file processing mechanism, which occurs even if the user never explicitly opens the extracted file.

Exploitation and Mitigation

The vulnerability is particularly dangerous because it does not require the user to open or execute the extracted file; simply extracting it from the archive is enough to trigger the NTLM hash leak.

This makes it a powerful tool for attackers seeking to compromise network security through pass-the-hash attacks or offline NTLM hash cracking.

A Proof of Concept (PoC) for CVE-2025-24071 has been released on GitHub, demonstrating how attackers can exploit this vulnerability using a Python script.

Microsoft addressed this vulnerability in its March 2025 Patch Tuesday update, and users are advised to ensure their Windows systems are updated with the latest security patches to prevent exploitation.

Additionally, security experts recommend implementing additional protections against NTLM relay attacks, such as enabling SMB signing and disabling NTLM where possible.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

SecPod launches Saner Cloud: A Revolutionary CNAPP For Preventive Cybersecurity

Moving Beyond Detection to Real-Time, Automated Security Across Workloads, Cloud, and Infrastructure SecPod, a global...

mySCADA myPRO Manager RCE Vulnerabilities Allow Remote Attackers to Take Control of ICS Devices

In a significant discovery, PRODAFT's security research team has identified two critical vulnerabilities in...

Hackers Use RMM Tools to Maintain Persistence and Navigate Networks Undetected

Threat actors have increasingly been leveraging legitimate remote monitoring and management (RMM) software to...

Threat Actors Leverage Legacy Drivers to Circumvent TLS Certificate Validation

Threat actors have recently been exploiting legacy drivers to bypass certificate validation, leveraging a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

mySCADA myPRO Manager RCE Vulnerabilities Allow Remote Attackers to Take Control of ICS Devices

In a significant discovery, PRODAFT's security research team has identified two critical vulnerabilities in...

Hackers Use RMM Tools to Maintain Persistence and Navigate Networks Undetected

Threat actors have increasingly been leveraging legitimate remote monitoring and management (RMM) software to...

Threat Actors Leverage Legacy Drivers to Circumvent TLS Certificate Validation

Threat actors have recently been exploiting legacy drivers to bypass certificate validation, leveraging a...