CVE-2025-24054
📋 TL;DR
This vulnerability in Windows NTLM allows an attacker to manipulate file paths or names externally, enabling network spoofing attacks. It affects Windows systems using NTLM authentication, potentially allowing attackers to impersonate legitimate users or services.
💻 Affected Systems
- Windows NTLM implementation
⚠️ Risk & Real-World Impact
Worst Case
Complete network compromise through credential theft, lateral movement across the network, and privilege escalation to domain administrator.
Likely Case
Unauthorized access to network resources, data exfiltration, and credential harvesting from vulnerable systems.
If Mitigated
Limited impact with proper network segmentation, strong authentication controls, and monitoring in place.
🎯 Exploit Status
Exploit code is publicly available, making exploitation more accessible to attackers with network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Microsoft Security Update for specific KB numbers
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054
Restart Required: Yes
Instructions:
1. Apply latest Windows security updates from Microsoft. 2. Restart affected systems. 3. Verify patch installation via Windows Update history.
🔧 Temporary Workarounds
Disable NTLM authentication
windowsReplace NTLM with Kerberos authentication where possible
Group Policy: Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options > Network security: Restrict NTLM
Network segmentation
allIsolate systems using NTLM from critical network segments
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable systems
- Enable enhanced logging and monitoring for NTLM authentication attempts
🔍 How to Verify
Check if Vulnerable:
Check Windows version and patch level against Microsoft advisory. Review NTLM usage in environment.
Check Version:
wmic os get caption,version,buildnumber
Verify Fix Applied:
Verify Windows Update history contains the relevant security patch. Check that NTLM-related security settings are properly configured.
📡 Detection & Monitoring
Log Indicators:
- Unusual NTLM authentication patterns
- Failed NTLM authentication attempts from unexpected sources
- Multiple NTLM requests from single source
Network Indicators:
- Unusual NTLM traffic patterns
- NTLM authentication attempts to unexpected services
- Spoofed NTLM negotiation packets
SIEM Query:
source="windows-security" EventCode=4625 AuthenticationPackage=NTLM | stats count by src_ip, user
🔗 References
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054
- http://seclists.org/fulldisclosure/2025/Apr/28
- https://www.exploit-db.com/exploits/52478
- https://www.vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-detection-script
- https://www.vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-mitigation-script
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24054