Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-24054

Опубликовано: 25 апр. 2025
Источник: msrc
CVSS3: 6.5
EPSS Средний

Описание

NTLM Hash Disclosure Spoofing Vulnerability

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an action other than opening or executing the file could trigger this vulnerability.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 97%
0.35445
Средний

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
3 месяца назад

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

CVSS3: 6.5
github
3 месяца назад

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

CVSS3: 6.5
fstec
3 месяца назад

Уязвимость реализации протокола NTLM операционной системы Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 97%
0.35445
Средний

6.5 Medium

CVSS3