Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Critical Windows Vulnerability Leaks NTLM Hashes Without User Interaction

CVE-2025-24071: NTLM Hash Leak via RAR/ZIP

Security researchers have discovered and documented a critical Windows vulnerability (CVE-2025-24071) that enables attackers to steal authentication credentials without any user interaction. The vulnerability, recently patched in Microsoft's March 2025 Patch Tuesday update, exploits Windows Explorer's automatic file processing mechanisms.

The exploit works by embedding malicious SMB links within .library-ms files that are compressed in RAR or ZIP archives. When a victim extracts these archives, Windows Explorer automatically processes the .library-ms files to generate previews and index metadata—even if the user never clicks on or opens the extracted files.

According to the technical analysis, the .library-ms file format is XML-based and is trusted by Windows Explorer to define search and library locations. 

The vulnerability exploits this trust by including a <simpleLocation> tag pointing to an attacker-controlled SMB server. When extracted, Windows automatically attempts to connect to this server, triggering an NTLM authentication handshake that exposes the victim's NTLMv2 hash.

Video PoC

Process monitoring tools confirm that Explorer.exe and SearchProtocolHost.exe automatically process these files immediately after extraction without user intervention. Wireshark captures further demonstrate that the extraction triggers SMB communication attempts, including an SMB2 Negotiate Protocol Request followed by an SMB2 Session Setup Request containing the NTLM authentication data.

The vulnerability is particularly concerning because the attack continues functioning even if the extracted file is moved to the trash. This allows the credential leak to persist until the malicious file is completely removed from the system.

Evidence suggests this vulnerability has been actively exploited in the wild. 

Researchers discovered forum posts by a threat actor known as "Krypt0n" (reportedly the developer of "EncryptHub Stealer"), who was potentially offering the exploit for sale on underground forums.

In these posts, the actor explains that the exploit works by generating a configuration with the attacker's IP and sharing information, which causes automatic redirection when a user accesses a shared folder containing the malicious file.

A proof-of-concept code has been published on GitHub, allowing security professionals to better understand and mitigate this threat. Users are strongly advised to install Microsoft's March security updates to protect against this vulnerability.

Post a Comment