CVE-2024-45301

5.3 MEDIUM

📋 TL;DR

This vulnerability in Mintty terminal emulator allows attackers to force the application to access arbitrary network paths via malicious escape sequences. When exploited, this can leak NetNTLMv2 hashes from the victim's machine to attacker-controlled servers, enabling credential theft and pass-the-hash attacks. Users of Mintty versions 2.3.6 through 3.7.4 on Cygwin, MSYS, or WSL are affected.

💻 Affected Systems

Products:
  • Mintty
Versions: 2.3.6 through 3.7.4
Operating Systems: Windows with Cygwin, MSYS, or WSL
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered by printing escape sequences in bash, requiring no special configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers capture NetNTLMv2 hashes, crack them offline to obtain credentials, then use pass-the-hash techniques to gain unauthorized access to systems and data.

🟠

Likely Case

Attackers capture NetNTLMv2 hashes and use them for lateral movement within networks or attempt offline cracking of weaker passwords.

🟢

If Mitigated

With proper network segmentation and monitoring, hash capture is detected and blocked before credential misuse occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires attacker to trick user into executing malicious commands or viewing crafted content in terminal.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.7.5

Vendor Advisory: https://github.com/mintty/mintty/security/advisories/GHSA-jf4m-m6rv-p6c5

Restart Required: Yes

Instructions:

1. Update Mintty to version 3.7.5 or later. 2. Restart all Mintty terminal sessions. 3. Verify update with 'mintty --version'.

🔧 Temporary Workarounds

Disable vulnerable escape sequences

all

Configure Mintty to ignore or sanitize problematic escape sequences

Add 'DisableEscapeSequences=true' to ~/.minttyrc

Network filtering

windows

Block outbound SMB/NTLM authentication attempts from workstations

🧯 If You Can't Patch

  • Restrict network access from Mintty terminals to only trusted internal resources
  • Implement application allowlisting to prevent unauthorized Mintty usage

🔍 How to Verify

Check if Vulnerable:

Check Mintty version with 'mintty --version' and compare to affected range 2.3.6-3.7.4

Check Version:

mintty --version

Verify Fix Applied:

Confirm version is 3.7.5 or higher with 'mintty --version'

📡 Detection & Monitoring

Log Indicators:

  • Unexpected SMB authentication attempts from Mintty processes
  • Network connections to unusual UNC paths

Network Indicators:

  • Outbound SMB traffic from workstations to untrusted IPs
  • NetNTLM authentication attempts to external servers

SIEM Query:

source="windows-security" EventCode=4625 AuthenticationPackage=NTLM ProcessName="*mintty*"

🔗 References

📤 Share & Export