Friday, April 25, 2025
Homecyber securityMicrosoft Windows NTLM File Explorer Vulnerability Exploited in The Wild - PoC...

Microsoft Windows NTLM File Explorer Vulnerability Exploited in The Wild – PoC Released

Published on

SIEM as a Service

Follow Us on Google News

A significant vulnerability in Microsoft Windows File Explorer, identified as CVE-2025-24071, has been discovered and is being actively exploited in the wild.

This vulnerability allows attackers to capture NTLM hashes, potentially leading to network spoofing attacks and credential theft.

The exploit involves specially crafted .library-ms files embedded within compressed archives like RAR or ZIP.

- Advertisement - Google News

When these files are extracted, Windows Explorer automatically processes them, initiating an NTLM authentication handshake with an attacker-controlled SMB server without requiring user interaction.

Windows NTLM
forum post

Technical Explanation of NTLM Hash Leak

The .library-ms file format is XML-based and trusted by Windows Explorer to define search and library locations.

When a specially crafted .library-ms file containing an SMB path is extracted from a compressed archive, Windows Explorer attempts to resolve this path automatically to gather metadata and index file information.

This action triggers an implicit NTLM authentication handshake from the victim’s system to the attacker-controlled SMB server, leaking the victim’s NTLMv2 hash without explicit user interaction.

The vulnerability exploits Windows Explorer’s automatic file processing mechanism, which occurs even if the user never explicitly opens the extracted file.

Exploitation and Mitigation

The vulnerability is particularly dangerous because it does not require the user to open or execute the extracted file; simply extracting it from the archive is enough to trigger the NTLM hash leak.

This makes it a powerful tool for attackers seeking to compromise network security through pass-the-hash attacks or offline NTLM hash cracking.

A Proof of Concept (PoC) for CVE-2025-24071 has been released on GitHub, demonstrating how attackers can exploit this vulnerability using a Python script.

Microsoft addressed this vulnerability in its March 2025 Patch Tuesday update, and users are advised to ensure their Windows systems are updated with the latest security patches to prevent exploitation.

Additionally, security experts recommend implementing additional protections against NTLM relay attacks, such as enabling SMB signing and disabling NTLM where possible.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...