Windows Woes: Microsoft Leaves Users Hanging with Clickless NTLM Exploit
A newly discovered zero-day vulnerability lets attackers snag NTLM credentials just by having users view a malicious file in Windows Explorer. The 0patch team found the flaw, but Microsoft hasn’t released a fix yet. Until then, 0patch offers a free micropatch to keep those NTLM credentials under wraps.

Hot Take:
Windows users everywhere can now enjoy a game of “Spot the Malicious File” without even opening it! Who knew that simply gazing upon a file in Windows Explorer could be hazardous? Move over, Medusa, there’s a new look-but-don’t-touch terror in town!
Key Points:
- A zero-day vulnerability allows attackers to capture NTLM credentials just by viewing a malicious file in Windows Explorer.
- The flaw affects all Windows versions from Windows 7 to the latest Windows 11 24H2.
- 0patch has issued a temporary micropatch, as Microsoft has yet to release an official fix.
- This vulnerability is the third zero-day flaw reported by 0patch to Microsoft without immediate action.
- Users can disable NTLM authentication as an alternative mitigation measure.
Already a member? Log in here