These flaws enable unauthenticated attackers to bypass login restrictions and potentially gain unauthorized access, including as the Guest account, on a wide range of legacy Windows systems.
The vulnerability arises from improper handling of NTLM Type 3 (AUTHENTICATE) messages in the Telnet server’s SSPI (Security Support Provider Interface) implementation.
By sending a specially crafted NTLM Type 3 message with empty credentials and the NEGOTIATE_ANONYMOUS flag, an attacker can force the server to map the authentication attempt to the Guest account, bypassing explicit Guest login restrictions.
Key technical details:
// Credential initialization with both client and server flags AcquireCredentialsHandle( NULL, L"NTLM", SECPKG_CRED_BOTH, // Vulnerable flag NULL, NULL, NULL, NULL, &m_hCredential, &tsExpiry ); // AcceptSecurityContext with mutual auth and delegation AcceptSecurityContext( &m_hCredential, ((fDoNTLMAuthFirstTime) ? NULL : &m_hContext), &InBuffDesc, ASC_REQ_REPLAY_DETECT | ASC_REQ_MUTUAL_AUTH | ASC_REQ_DELEGATE, // Vulnerable flags SECURITY_NATIVE_DREP, &m_hContext, &OutBuffDesc, &fContextAttr, &tsExpiry );NEGOTIATE_ANONYMOUS | NEGOTIATE_NTLM (0x00000A01)| Step | Normal NTLM Authentication | Exploit Flow (Guest Bypass) |
|---|---|---|
| 1 | Client sends Type 1 (NEGOTIATE) | Client sends Type 1 (NEGOTIATE, anonymous) |
| 2 | Server sends Type 2 (CHALLENGE) | Server sends Type 2 (CHALLENGE) |
| 3 | Client sends Type 3 (AUTHENTICATE, user credentials) | Client sends Type 3 (AUTHENTICATE, empty credentials) |
| 4 | Server validates user credentials | Server maps to Guest SID, bypassing restriction |
A proof-of-concept tool, telnetguest.exe, automates the attack. Usage example:
bashtelnetguest.exe <target_ip> [port]
target_ip: Target Windows Telnet Server IPport: Optional (default 23)If the Guest account is a member of the TelnetClients group, the attacker may gain an interactive Telnet session, though shell access may still be limited by group policy or account restrictions.
TelnetClients group.| Windows Version | Vulnerable (NTLM enabled) |
|---|---|
| Windows 2000 | Yes |
| Windows XP | Yes |
| Windows Server 2003 | Yes |
| Windows Vista | Yes |
| Windows Server 2008 | Yes |
| Windows 7 | Yes |
| Windows Server 2008 R2 | Yes |
These vulnerabilities highlight the ongoing risks of maintaining legacy protocols and services.
Organizations are urged to disable Microsoft Telnet Server and migrate to more secure alternatives such as SSH.
No patch is currently available, and the exploit is publicly documented, increasing the risk of widespread attacks.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates
The post Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions appeared first on Cyber Security News.
The post A Secretive AI Hacking System Has Sparked A Global Scramble appeared first on…
The post Microsoft Offers Its First Buyouts To Shape Workforce Around AI Push appeared first…
The post Tech Leaders Celebrated At 15th Annual Women In Technology Awards appeared first on TV…
The post NBCU’s Universal Production Services to Launch Solar, Off-Grid Trailer Fleet appeared first on…
ACI Communications is integrating its Infinity amplifiers with Harmonic’s cloud-native cOS Virtualized Broadband Platform and…
A high-severity vulnerability in Python’s asyncio module has been identified, exposing Windows systems to memory-corruption…
This website uses cookies.