Windows Under Attack: NTLM Hash Disclosure Spoofing Vulnerability Threatens User Credentials
CVE-2024-43451

6.5MEDIUM

Key Information:

Vendor
Microsoft
Status
Windows Server 2025
Windows Server 2025 (server Core Installation)
Windows 10 Version 1809
Windows Server 2019
Vendor
CVE Published:
12 November 2024

Badges

๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 9,240๐Ÿ’ฐ Ransomware๐Ÿ‘พ Exploit Exists๐Ÿฆ… CISA Reported๐Ÿ“ฐ News Worthy

What is CVE-2024-43451?

CVE-2024-43451 is a critical vulnerability affecting Microsoft's Windows operating system, specifically related to the NTLM (NT LAN Manager) authentication protocol. This vulnerability allows attackers to exploit weaknesses in NTLM hash handling, leading to potential exposure of user credentials. Organizations utilizing Windows environments that rely on NTLM for authentication could face severe security risks, including unauthorized access to sensitive systems and data. The threat is particularly acute given the widespread use of NTLM in enterprise networks, where credentials can be crucial for identity verification and access control.

Technical Details

The vulnerability is characterized as an NTLM Hash Disclosure Spoofing Vulnerability, where attackers can manipulate NTLM hashes to reveal hashed credentials. The exploitation of this vulnerability involves specific sequences that can trick the system into disclosing sensitive authentication information without proper authorization. As NTLM is often used for legacy applications and environments, the scope of potential impact could affect many organizations still relying on outdated authentication mechanisms.

Impact of the Vulnerability

  1. Credential Theft: The primary impact of CVE-2024-43451 is the potential for credential theft, enabling attackers to access and exploit user accounts across the network. This can lead to unauthorized disclosures of sensitive information and broaden the attack surface for further intrusions.

  2. Privilege Escalation: Successful exploitation can allow attackers to escalate privileges, gaining higher levels of access than intended. This capability can facilitate lateral movement within an organizationโ€™s infrastructure, making it easier for attackers to target more critical assets.

  3. Increased Risk of Ransomware Attacks: With stolen credentials and escalated privileges, malicious actors may use this vulnerability as a foothold for deploying ransomware. The ability to navigate networks undetected heightens the risk of catastrophic data loss and operational disruptions.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20826

Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7515

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.6532

News Articles

CVE-2024-43451 allows stealing NTLMv2 hash

Patch Tuesday, November 2024: CVE-2024-43451, used in real attacks, permits stealing an NTLMv2 hash with minimal interaction from the victim.

2 months ago

Patch Tuesday brings a mystery Kerberos vulnerability, more.

November Patch Tuesday: Two exploited Microsoft bugs and a CVSS 9.8 "wormable" Kerberos vulnerability reported. Here's some highlights.

2 months ago

How a Windows zero-day was exploited in the wild for months (CVE-2024-43451) - Help Net Security

CVE-2024-43451, a Windows zero-day vulnerability for which Microsoft released a fix on Tuesday, has been exploited since at least April 2024.

2 months ago

References

EPSS Score

1% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • ๐Ÿ’ฐ

    Used in Ransomware

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿฆ…

    CISA Reported

  • ๐Ÿ“ฐ

    First article discovered by Hackread

  • Vulnerability published

Collectors

NVD DatabaseMitre DatabaseCISA DatabaseMicrosoft Feed9 News Article(s)
.