Windows Under Attack: NTLM Hash Disclosure Spoofing Vulnerability Threatens User Credentials
CVE-2024-43451
Key Information:
- Vendor
- Microsoft
- Status
- Windows Server 2025
- Windows Server 2025 (server Core Installation)
- Windows 10 Version 1809
- Windows Server 2019
- Vendor
- CVE Published:
- 12 November 2024
Badges
What is CVE-2024-43451?
CVE-2024-43451 is a critical vulnerability affecting Microsoft's Windows operating system, specifically related to the NTLM (NT LAN Manager) authentication protocol. This vulnerability allows attackers to exploit weaknesses in NTLM hash handling, leading to potential exposure of user credentials. Organizations utilizing Windows environments that rely on NTLM for authentication could face severe security risks, including unauthorized access to sensitive systems and data. The threat is particularly acute given the widespread use of NTLM in enterprise networks, where credentials can be crucial for identity verification and access control.
Technical Details
The vulnerability is characterized as an NTLM Hash Disclosure Spoofing Vulnerability, where attackers can manipulate NTLM hashes to reveal hashed credentials. The exploitation of this vulnerability involves specific sequences that can trick the system into disclosing sensitive authentication information without proper authorization. As NTLM is often used for legacy applications and environments, the scope of potential impact could affect many organizations still relying on outdated authentication mechanisms.
Impact of the Vulnerability
-
Credential Theft: The primary impact of CVE-2024-43451 is the potential for credential theft, enabling attackers to access and exploit user accounts across the network. This can lead to unauthorized disclosures of sensitive information and broaden the attack surface for further intrusions.
-
Privilege Escalation: Successful exploitation can allow attackers to escalate privileges, gaining higher levels of access than intended. This capability can facilitate lateral movement within an organizationโs infrastructure, making it easier for attackers to target more critical assets.
-
Increased Risk of Ransomware Attacks: With stolen credentials and escalated privileges, malicious actors may use this vulnerability as a foothold for deploying ransomware. The ability to navigate networks undetected heightens the risk of catastrophic data loss and operational disruptions.
CISA Reported
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.
The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20826
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7515
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.6532
News Articles
CVE-2024-43451 allows stealing NTLMv2 hash
Patch Tuesday, November 2024: CVE-2024-43451, used in real attacks, permits stealing an NTLMv2 hash with minimal interaction from the victim.
2 months ago
Patch Tuesday brings a mystery Kerberos vulnerability, more.
November Patch Tuesday: Two exploited Microsoft bugs and a CVSS 9.8 "wormable" Kerberos vulnerability reported. Here's some highlights.
2 months ago
How a Windows zero-day was exploited in the wild for months (CVE-2024-43451) - Help Net Security
CVE-2024-43451, a Windows zero-day vulnerability for which Microsoft released a fix on Tuesday, has been exploited since at least April 2024.
2 months ago
References
EPSS Score
1% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- ๐ฐ
Used in Ransomware
- ๐
Vulnerability started trending
- ๐พ
Exploit known to exist
- ๐ฆ
CISA Reported
- ๐ฐ
First article discovered by Hackread
Vulnerability published