Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-59185

Опубликовано: 14 окт. 2025
Источник: msrc
CVSS3: 6.5
EPSS Низкий

Описание

NTLM Hash Disclosure Spoofing Vulnerability

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user interacting with the file in multiple ways will cause the NTLM hash to be leaked. A few interactions which trigger this leak include:

  • Opening the parent folder in Explorer
  • Clicking the file (any mouse button)
  • Dragging the file
  • Deleting the file

Обновления

ПродуктСтатьяОбновление
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 25%
0.00083
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
20 дней назад

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.

CVSS3: 6.5
github
20 дней назад

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.

CVSS3: 6.5
fstec
20 дней назад

Уязвимость компонента NTLM Hash операционной системы Windows, позволяющая нарушителю проводить спуфинг-атаки

EPSS

Процентиль: 25%
0.00083
Низкий

6.5 Medium

CVSS3