Cyber Security News

Microsoft Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing – PoC Released

A critical vulnerability in Windows File Explorer, identified as CVE-2025-24071, enables attackers to steal NTLM hashed passwords without any user interaction beyond simply extracting a compressed file. 

Security researchers have released a proof-of-concept exploit demonstrating this high-severity flaw, which Microsoft patched in its March 2025 updates.

Microsoft Windows File Explorer Vulnerability

The vulnerability, dubbed “NTLM Hash Leak via RAR/ZIP Extraction,” exploits Windows Explorer’s automatic file processing mechanism. 

When a specially crafted .library-ms file containing a malicious SMB path is extracted from a compressed archive, Windows Explorer automatically parses its contents to generate previews and index metadata.

This automatic processing occurs even if the user never explicitly opens the extracted file. 

The .library-ms file format, which is XML-based and trusted by Windows Explorer to define library locations, includes a <simpleLocation> tag that points to an attacker-controlled SMB server, said security researcher with alias “0x6rss”.

Upon extraction, Windows Explorer attempts to resolve the embedded SMB path (e.g., \\192.168.1.116\shared) automatically to gather metadata

This action triggers an NTLM authentication handshake from the victim’s system to the attacker’s server, leaking the victim’s NTLMv2 hash without any user interaction.

Using process monitoring tools, researchers observed that immediately after extraction, both Explorer.exe and SearchProtocolHost.exe (part of Windows’ indexing service) automatically perform several operations on the .library-ms file:

  • CreateFile: Opening the file automatically
  • ReadFile: Reading the file contents
  • QueryBasicInformationFile: Extracting metadata
  • CloseFile: Closing the file after processing

Wireshark captures confirm that these actions immediately trigger SMB communication attempts, including an NTLM authentication handshake.

Risk FactorsDetails
Affected ProductsMicrosoft Windows (specifically Windows File Explorer)
Impact-Leaks victim’s NTLMv2-Credential theft for pass-the-hash attacks-Potential offline NTLM hash cracking-Creates spoofing vulnerability
Exploit Prerequisites-User must extract a specially crafted .library-ms file-Attacker needs to set up an SMB server to receive authentication request
CVSS 3.1 Score7.5 (Important )

PoC Exploitation

The vulnerability allows for exposure of sensitive information to unauthorized actors, enabling network spoofing attacks.

A security researcher with the handle 0x6rss published a proof-of-concept exploit on GitHub on March 16, 2025. The PoC includes a Python script that generates the malicious .library-ms file and can be used with a simple command: python poc.py

Evidence suggests this vulnerability may have been sold and exploited in the wild before its public disclosure. 

A threat actor known as “Krypt0n,” reportedly the developer of malware called “EncryptHub Stealer,” allegedly offered the exploit for sale on underground forums.

Threat Actor’s post

According to translated forum posts, the attacker explained: “The server where the hashes are sent is created locally, for example, on a VPS. 

Then, using an exploit, you generate a config with your IP, share, etc. […] If the user simply opens Explorer or accesses the shared folder, an automatic redirect occurs, and the user’s hash is sent to your server.”

Mitigation

Microsoft addressed this vulnerability with the release of its March 2025 Patch Tuesday updates on March 11.

All Windows users are strongly advised to apply these security updates immediately. This vulnerability adds to a growing list of NTLM-related flaws in Microsoft products, with researchers previously identifying similar credential-leaking issues in Microsoft Access, Publisher, and other applications.

Security experts recommend keeping all Microsoft products updated and implementing additional protections against NTLM relay attacks, such as enabling SMB signing and disabling NTLM where possible.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Google has issued an urgent security update for its Chrome web browser to address three…

4 hours ago

Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access

Cybersecurity professionals are facing an unprecedented acceleration in threat actor capabilities as the average breakout…

6 hours ago

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

A sophisticated malware campaign has emerged in the npm ecosystem, utilizing an innovative steganographic technique…

6 hours ago

Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware

Zloader, a sophisticated Zeus-based modular trojan that first emerged in 2015, has undergone a significant…

7 hours ago

Beware of Fake Online Speedtest Application With Obfuscated JS Codes

A sophisticated malware campaign has emerged that leverages fake online speed test applications to deploy…

11 hours ago

Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors

Defy Security, a leading provider of cybersecurity solutions and services, today announced the appointment of…

13 hours ago