Attacker Value
Very High
(1 user assessed)
Exploitability
Very High
(1 user assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
1

CVE-2024-43451

Disclosure Date: November 12, 2024
Exploited in the Wild
Reported by AttackerKB Worker and 1 more...
View Source Details
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

NTLM Hash Disclosure Spoofing Vulnerability

Add Assessment

1
Ratings
  • Attacker Value
    Very High
  • Exploitability
    Very High
Technical Analysis

CVE-2024-43451 is a Windows NTLM hash disclosure vulnerability categorized as a “spoofing” flaw that affects all supported Microsoft Windows versions, including Windows 10, Windows 11, and Windows Server editions.

The vulnerability stems from how Windows handles Internet Shortcut (.URL) files, exploiting a weakness in the outdated MSHTML (Internet Explorer) engine still present in the OS.

An attacker can craft a malicious .URL file pointing to a network path (UNC) hosted on an attacker-controlled server. When Windows Explorer or related components interact with this file, the system automatically attempts to retrieve remote resources over SMB, triggering an NTLM authentication handshake without requiring user approval.

Essentially, as soon as the file is engaged, Windows “calls out” to the attacker’s SMB server, sending the user’s NTLMv2 hash (hashed credentials) for authentication.

The vulnerability arises because seemingly harmless file interactions—such as previewing, moving, or right-clicking a .URL shortcut—cause the Windows shell to invoke the MSHTML/Explorer subsystem to fetch external content, such as an icon or target path.

Since the path can be a remote SMB share (file:// URI or UNC), Windows automatically performs NTLM authentication with that remote server, unknowingly leaking the NTLMv2 password hash to the attacker.

This flaw does not execute arbitrary code directly but compromises confidentiality by exposing credentials.

With the stolen hash, an attacker can impersonate the user on a network by performing a pass-the-hash attack, allowing them to authenticate without needing the user’s plaintext password.

CVSS V3 Severity and Metrics
Base Score:
6.5 Medium
Impact Score:
3.6
Exploitability Score:
2.8
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
None
Availability (A):
None

General Information

Exploited in the Wild

Reported by:

Additional Info

Technical Analysis