This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Microsoft NTLM protocol flaw allows **NTLMv2 hash leakage**.β¦
π **Root Cause**: **CWE-73** (External Control of File Name or Path). <br>β οΈ **Flaw**: Windows Explorer processes `.library-ms` files with UNC paths, triggering unintended SMB authentication requests that leak hashes.β¦
π₯οΈ **Affected**: <br>β’ Windows 10 v1809 (32-bit & x64) <br>β’ Windows Server 2019 <br>β’ *Note: Data lists v1507 as product, but description specifies v1809/Server 2019.* π
π **Public Exp?**: **YES**. <br>Multiple PoCs on GitHub (e.g., `CVE-2025-24054_PoC`). <br>β’ Uses `.library-ms` + Responder to capture hashes. <br>β’ Wild exploitation risk is **HIGH**. ππ£
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Check for **March 2025 Patch Tuesday** updates. <br>2. Monitor for `.library-ms` files with UNC paths. <br>3. Scan logs for unexpected **SMB authentication** attempts. ππ
Q8Is it fixed officially? (Patch/Mitigation)
π‘οΈ **Official Fix**: **YES**. <br>β’ Microsoft released patches in **March 2025**. <br>β’ See MSRC Advisory: `msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054`. β π§