Sunday, May 18, 2025
HomeCyber Security NewsCritical Microsoft 0-Click Telnet Vulnerability Enables Credential Theft Without User Action

Critical Microsoft 0-Click Telnet Vulnerability Enables Credential Theft Without User Action

Published on

SIEM as a Service

Follow Us on Google News

A critical vulnerability has been uncovered in Microsoft’s Telnet Client (telnet.exe), enabling attackers to steal Windows credentials from unsuspecting users, even without interaction in certain network scenarios.

Security researchers warn that this “zero-click” flaw could be readily exploited in corporate environments, with severe consequences for network integrity.

How the Attack Works

The vulnerability centers on the Microsoft Telnet Client’s MS-TNAP authentication protocol.

- Advertisement - Google News

When a Windows user connects to a malicious Telnet server, either by manually opening a connection or clicking on a specially-crafted telnet:// hyperlink (which can be embedded in emails, websites, or documents), the client initiates authentication.

If the server resides within the Intranet or Trusted Zone – or if system policies allow silent authentication – Windows will automatically transmit the user’s NTLM authentication data, all without warning or requiring user approval.

  • Internet Zone: Users are prompted before credentials are sent.
  • Intranet/Trusted Sites Zone: Credentials may be sent automatically – no prompt, no warning.

This behavior is especially risky for organizations that have added internal IP ranges or hosts to trusted zones without specifying a protocol.

For example, entering an IP like 192.168.1.1 (without specifying http://) means all protocols, including Telnet, are trusted for that host, not just web traffic.

An attacker can exploit this by:

  1. Setting up a malicious Telnet server.
  2. Enticing users to click a telnet:// link (e.g., via a phishing email).
  3. Capturing NTLM hashes from connecting clients.

Captured hashes can then be used for NTLM relay attacks or cracked offline using tools like Hashcat, giving attackers potential access to sensitive systems and data.

Proof of Concept and Exploit Code

A working proof-of-concept is already in the wild, demonstrating step-by-step how authentication data can be harvested.

For example, the exploit logs NTLM authentication exchanges and outputs captured hashes in formats compatible with popular password cracking tools.

hashcat -m 5600 -a 0 -O netntlmv2.hash passwords.txt

The above command enables attackers to crack harvested NTLMv2 hashes against a password list, recovering credentials in seconds if weak passwords are in use.

Mitigation and Recommendations

  • Review Trusted Zones: Ensure hosts/IPs in Intranet/Trusted Sites zones are entered with protocol specifiers (e.g., http://), not just raw IPs.
  • Disable Telnet Client: Uninstall or disable the Telnet feature on all Windows machines unless strictly necessary.
  • User Awareness: Train users to avoid clicking suspicious telnet:// links or opening unknown LNK files.

All supported and unsupported Windows versions with the Telnet Client installed are vulnerable, including Windows 7–11, Windows Server 2008–2025, and legacy platforms.

This zero-click Telnet vulnerability underscores the risks of legacy protocols and misconfigured trust settings.

Administrators are urged to audit their environments and implement recommended defenses immediately to prevent silent credential theft.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...