Windows Woes: Microsoft Leaves Users Hanging with Clickless NTLM Exploit

A newly discovered zero-day vulnerability lets attackers snag NTLM credentials just by having users view a malicious file in Windows Explorer. The 0patch team found the flaw, but Microsoft hasn’t released a fix yet. Until then, 0patch offers a free micropatch to keep those NTLM credentials under wraps.

Pro Dashboard

Hot Take:

Windows users everywhere can now enjoy a game of “Spot the Malicious File” without even opening it! Who knew that simply gazing upon a file in Windows Explorer could be hazardous? Move over, Medusa, there’s a new look-but-don’t-touch terror in town!

Key Points:

  • A zero-day vulnerability allows attackers to capture NTLM credentials just by viewing a malicious file in Windows Explorer.
  • The flaw affects all Windows versions from Windows 7 to the latest Windows 11 24H2.
  • 0patch has issued a temporary micropatch, as Microsoft has yet to release an official fix.
  • This vulnerability is the third zero-day flaw reported by 0patch to Microsoft without immediate action.
  • Users can disable NTLM authentication as an alternative mitigation measure.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?