Categories: Cyber Security News

Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions

Security researchers have disclosed a series of high-risk vulnerabilities in Microsoft Telnet Server, specifically targeting the NTLM authentication mechanism within the Microsoft Telnet Authentication Protocol (MS-TNAP).

These flaws enable unauthenticated attackers to bypass login restrictions and potentially gain unauthorized access, including as the Guest account, on a wide range of legacy Windows systems.

Technical Overview

Vulnerability Summary

  • Name: MS-TNAP Guest Access Restriction Bypass
  • CVSS Score: 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N)
  • Impacted Systems: Windows 2000, XP, Server 2003, Vista, Server 2008, Windows 7, Server 2008 R2
  • Authentication Protocol: NTLM via MS-TNAP (Telnet: NT LAN Manager Authentication Protocol)
  • No official patch available; disabling Telnet is strongly recommended.

Exploit Mechanism

The vulnerability arises from improper handling of NTLM Type 3 (AUTHENTICATE) messages in the Telnet server’s SSPI (Security Support Provider Interface) implementation.

By sending a specially crafted NTLM Type 3 message with empty credentials and the NEGOTIATE_ANONYMOUS flag, an attacker can force the server to map the authentication attempt to the Guest account, bypassing explicit Guest login restrictions.

Key technical details:

  • The server processes NTLM messages using the following vulnerable SSPI calls: c// Credential initialization with both client and server flags AcquireCredentialsHandle( NULL, L"NTLM", SECPKG_CRED_BOTH, // Vulnerable flag NULL, NULL, NULL, NULL, &m_hCredential, &tsExpiry ); // AcceptSecurityContext with mutual auth and delegation AcceptSecurityContext( &m_hCredential, ((fDoNTLMAuthFirstTime) ? NULL : &m_hContext), &InBuffDesc, ASC_REQ_REPLAY_DETECT | ASC_REQ_MUTUAL_AUTH | ASC_REQ_DELEGATE, // Vulnerable flags SECURITY_NATIVE_DREP, &m_hContext, &OutBuffDesc, &fContextAttr, &tsExpiry );
  • NTLM Type 3 Message Construction:
    • Flags: NEGOTIATE_ANONYMOUS | NEGOTIATE_NTLM (0x00000A01)
    • All credential fields (LM/NTLM responses, domain, username, workstation, session key) are empty.
  • The server’s SSPI maps this message to the Guest account SID, bypassing the restriction normally enforced in password-based logins.

Authentication Flow Comparison

Step Normal NTLM Authentication Exploit Flow (Guest Bypass)
1 Client sends Type 1 (NEGOTIATE) Client sends Type 1 (NEGOTIATE, anonymous)
2 Server sends Type 2 (CHALLENGE) Server sends Type 2 (CHALLENGE)
3 Client sends Type 3 (AUTHENTICATE, user credentials) Client sends Type 3 (AUTHENTICATE, empty credentials)
4 Server validates user credentials Server maps to Guest SID, bypassing restriction

Exploit Usage

A proof-of-concept tool, telnetguest.exe, automates the attack. Usage example:

bashtelnetguest.exe <target_ip> [port]
  • target_ip: Target Windows Telnet Server IP
  • port: Optional (default 23)

If the Guest account is a member of the TelnetClients group, the attacker may gain an interactive Telnet session, though shell access may still be limited by group policy or account restrictions.

Risk and Mitigation

  • Risk: Allows remote, unauthenticated attackers to log in as Guest-even if the account is renamed-bypassing intended restrictions.
  • Mitigations:
    • Disable the Guest account and ensure it is not in the TelnetClients group.
    • Disable NTLM authentication or the Telnet service entirely.
    • Restrict network access to port 23 (Telnet).
    • Monitor authentication logs for suspicious Guest or anonymous logins.

Table: Affected Windows Versions

Windows Version Vulnerable (NTLM enabled)
Windows 2000 Yes
Windows XP Yes
Windows Server 2003 Yes
Windows Vista Yes
Windows Server 2008 Yes
Windows 7 Yes
Windows Server 2008 R2 Yes

These vulnerabilities highlight the ongoing risks of maintaining legacy protocols and services.

Organizations are urged to disable Microsoft Telnet Server and migrate to more secure alternatives such as SSH.

No patch is currently available, and the exploit is publicly documented, increasing the risk of widespread attacks.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

A Secretive AI Hacking System Has Sparked A Global Scramble

The post A Secretive AI Hacking System Has Sparked A Global Scramble appeared first on…

10 minutes ago

Microsoft Offers Its First Buyouts To Shape Workforce Around AI Push

The post Microsoft Offers Its First Buyouts To Shape Workforce Around AI Push appeared first…

10 minutes ago

Tech Leaders Celebrated At 15th Annual Women In Technology Awards

The post Tech Leaders Celebrated At 15th Annual Women In Technology Awards appeared first on TV…

10 minutes ago

NBCU’s Universal Production Services to Launch Solar, Off-Grid Trailer Fleet

The post NBCU’s Universal Production Services to Launch Solar, Off-Grid Trailer Fleet appeared first on…

10 minutes ago

ACI Integrates Infinity Amplifiers With Harmonic’s cOS To Speed DOCSIS 4.0

ACI Communications is integrating its Infinity amplifiers with Harmonic’s cloud-native cOS Virtualized Broadband Platform and…

10 minutes ago

Critical Python Vulnerability Enables Out-of-Bounds Write on Windows Systems

A high-severity vulnerability in Python’s asyncio module has been identified, exposing Windows systems to memory-corruption…

40 minutes ago

This website uses cookies.