This zero-day flaw enables attackers to capture users’ NTLM authentication credentials simply by having them view a malicious file in Windows Explorer.
The vulnerability can be triggered when opening a shared folder, inserting a USB drive containing the malicious file, or even viewing a Downloads folder where such a file was previously downloaded from an attacker’s website.
The newly discovered vulnerability shares similar attack scenarios with a previously patched URL file flaw (CVE-2025-21377),
While security researchers are withholding specific exploitation details until Microsoft releases an official patch, they confirm the vulnerability allows for credential theft through malicious file interaction.
Stop attacks before they start, powered by a 97% precise neural Network to Detect Cyber Attacks
Although not classified as critical, this NTLM credential theft vulnerability remains dangerous, particularly in environments where attackers have already gained network access or can target public-facing servers like Exchange to relay stolen credentials.
Security intelligence confirms these types of vulnerabilities have been actively exploited in real-world attacks.
The security team has reported this vulnerability to Microsoft according to responsible disclosure practices.
While awaiting an official fix, they have developed and released micropatches available via 0patch that will temporarily mitigate the issue. These micropatches will remain free until Microsoft implements a permanent solution.
This represents the fourth zero-day vulnerability recently discovered by the same research team following:
Additionally, the “EventLogCrasher” vulnerability reported in January 2024, which allows attackers to disable Windows event logging across domain computers, remains unpatched by Microsoft.
The temporary security patches support a comprehensive range of Windows versions, including:
The micropatches have already been automatically distributed to affected systems with the 0patch Agent installed under PRO or Enterprise accounts.
To implement these protective measures, new users should create a free account in 0patch Central, start the available trial, and install and register the 0patch Agent.
The process requires no system reboots, and patch deployment occurs automatically, providing immediate protection against this zero-day vulnerability while awaiting Microsoft’s official fix.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
The post New Windows 0-Day Vulnerability Let Remote Attackers Steal NTLM Credentials – Unofficial Patch appeared first on Cyber Security News.
Trump summoned tech leaders to the White House on Wednesday, March 4, 2026 to sign…
Epic CEO Tim Sweeney might be one of the most outspoken people in the history…
WASHINGTON (AP) — Senate Republicans voted down an effort Wednesday to halt President Donald Trump’s war…
Secretary of Homeland Security Kristi Noem testifies during the U.S, House Judiciary Committee on March…
Plans are to turn the building into a multi-purpose venue for different non-profit and youth…
Rockford city officials released new information Wednesday in response to growing questions about a large-scale…
This website uses cookies.