Windows Under Attack: NTLM Hash Disclosure Spoofing Vulnerability Threatens User Credentials
CVE-2024-43451

6.5MEDIUM

Key Information:

Badges

📈 Trended📈 Score: 9,240💰 Ransomware👾 Exploit Exists🟡 Public PoC🦅 CISA Reported📰 News Worthy

What is CVE-2024-43451?

CVE-2024-43451 is a critical vulnerability affecting Microsoft's Windows operating system, specifically related to the NTLM (NT LAN Manager) authentication protocol. This vulnerability allows attackers to exploit weaknesses in NTLM hash handling, leading to potential exposure of user credentials. Organizations utilizing Windows environments that rely on NTLM for authentication could face severe security risks, including unauthorized access to sensitive systems and data. The threat is particularly acute given the widespread use of NTLM in enterprise networks, where credentials can be crucial for identity verification and access control.

Technical Details

The vulnerability is characterized as an NTLM Hash Disclosure Spoofing Vulnerability, where attackers can manipulate NTLM hashes to reveal hashed credentials. The exploitation of this vulnerability involves specific sequences that can trick the system into disclosing sensitive authentication information without proper authorization. As NTLM is often used for legacy applications and environments, the scope of potential impact could affect many organizations still relying on outdated authentication mechanisms.

Impact of the Vulnerability

  1. Credential Theft: The primary impact of CVE-2024-43451 is the potential for credential theft, enabling attackers to access and exploit user accounts across the network. This can lead to unauthorized disclosures of sensitive information and broaden the attack surface for further intrusions.

  2. Privilege Escalation: Successful exploitation can allow attackers to escalate privileges, gaining higher levels of access than intended. This capability can facilitate lateral movement within an organization’s infrastructure, making it easier for attackers to target more critical assets.

  3. Increased Risk of Ransomware Attacks: With stolen credentials and escalated privileges, malicious actors may use this vulnerability as a foothold for deploying ransomware. The ability to navigate networks undetected heightens the risk of catastrophic data loss and operational disruptions.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20826

Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7515

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.6532

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Single Right-Click Let Hackers Gain Access To System By Exploiting 0-Day

A newly discovered zero-day vulnerability in Windows systems, CVE-2024-43451, has been actively exploited by suspected Russian hackers to target Ukrainian entities.

3 months ago

CVE-2024-43451 allows stealing NTLMv2 hash

Patch Tuesday, November 2024: CVE-2024-43451, used in real attacks, permits stealing an NTLMv2 hash with minimal interaction from the victim.

3 months ago

Patch Tuesday brings a mystery Kerberos vulnerability, more.

November Patch Tuesday: Two exploited Microsoft bugs and a CVSS 9.8 "wormable" Kerberos vulnerability reported. Here's some highlights.

3 months ago

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 💰

    Used in Ransomware

  • 📈

    Vulnerability started trending

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • 📰

    First article discovered by Hackread

  • Vulnerability published

.