All versions of Windows clients, from Windows 7 through current Windows 11 versions, contain a 0-day vulnerability that could allow attackers to capture NTLM authentication hashes from users of affected systems.
Researchers at ACROS Security reported the flaw to Microsoft this week. They discovered the issue while writing a patch for older Windows systems for CVE-2024-38030, a medium-severity Windows Themes spoofing vulnerability that Microsoft mitigated in its July security update.
Variant of Two Previous Vulnerabilities
The vulnerability that ACROS discovered is very similar to CVE-2024-38030 and enables what is known as an authentication coercion attack, where a vulnerable device is essentially coerced into sending NTLM hashes — the cryptographic representation of a user’s password — to an attacker’s system. Akamai researcher Tomer Peled discovered CVE-2024-38030 while analyzing Microsoft’s fix for CVE-2024-21320, another, earlier Windows themes spoofing vulnerability he discovered and reported to Microsoft. The flaw that ACROS uncovered is a new, separate vulnerability related to the two flaws Peled reported earlier.
Windows themes files allow users to customize the appearance of their Windows desktop interface via wallpapers, screen savers, colors, and sounds. Both the vulnerabilities that Akamai researcher Peled discovered had to do with the manner in which the themes handled file paths to a couple of image resources, specifically “BrandImage” or “Wallpaper.” Peled found that because of improper validation, an attacker could manipulate the legitimate path to these resources in such a way as to get Windows to automatically send an authenticated request, along with the user’s NTLM hash, to the attacker’s device.
As Peled explains to Dark Reading, “The themes file format is an .ini file, with multiple ‘key,value’ pairs. I originally found two key,value pairs that could accept file paths,” he says.
The original vulnerability (CVE-2024-21320) stemmed from the fact that the key,value pairs accepted UNC paths — a standardized format for identifying network resources like shared files and folders — for network drives, Peled notes. “This [meant] that a weaponized theme file, with a UNC path, could trigger an outbound connection with user authentication, without them knowing.” Microsoft fixed the issue by adding a check on the file path to ensure it wasn’t a UNC path. But, Peled says, the function Microsoft used for this validation allowed for some bypasses, which is what led to Peled’s discovery of the second vulnerability (CVE-2024-38030).
Microsoft Will Act ‘As Needed’
What ACROS Security reported this week is the third Windows themes spoofing vulnerability rooted in the same file path issue. “Our researchers discovered the vulnerability in early October while writing a patch for CVE-2024-38030 intended for legacy Windows systems many of our users are still using,” says Mitja Kolsek, CEO of ACROS Security. “We reported this issue to Microsoft [on] Oct. 28, 2024, but we did not release details or a proof-of-concept, which we plan to do after Microsoft has made their own patch publicly available.”
A Microsoft spokesman said via email the company is aware of the ACROS report and “will take action as needed to help keep customers protected.” The company does not appear to have issued a CVE, or vulnerability identifier, for the new issue yet.
Like the two previous Windows themes spoofing vulnerabilities that Akamai discovered, the new one that ACROS found also does not require an attacker to have any special privileges. “But they have to somehow get the user to copy a theme file to some other folder on their computer, then open that folder with Windows Explorer using a view that renders icons,” Kolsek says. “The file could also be automatically downloaded to their Downloads folder while visiting [an] attacker’s website, in which case the attacker would have to wait for the user to view the Downloads folder at a later time.”
Kolsek recommends that organizations disable NTLM where possible, but acknowledges that doing so could cause functional problems if any network components rely on it. “[An] attacker could only successfully target a computer where NTLM is enabled,” he says. “Another requirement is that a request initiated by a malicious theme file would be able to reach the attacker’s server on the Internet or in an adjacent network,” something that firewalls should typically block, he says. As a result, it’s more likely than an attacker would try to exploit the flaw in a targeted campaign more so than in a mass exploit.
Akamai’s Peled says it’s hard to know what ACROS’s vulnerability is about without having access to the technical details. “But it might be another UNC bypass that circumvents the check, or it could be a different key,value pair that was missed in the original patching,” he says. “UNC path formats are very complex and allow for weird combinations, which make detecting them very hard. This might be why it’s so complex to fix.”
Source link
#Recurring #Windows #Flaw #Expose #User #Credentials
ai improve text
ai text generator tools
best ai text generators
blues metronome
brain bravida
comfyui ndi
data governance failures
fivetran blind
h&r block taxes generative ai
insurance denials builds aipowered for fighting
Unlock the potential of cutting-edge AI solutions with our comprehensive offerings. As a leading provider in the AI landscape, we harness the power of artificial intelligence to revolutionize industries. From machine learning and data analytics to natural language processing and computer vision, our AI solutions are designed to enhance efficiency and drive innovation. Explore the limitless possibilities of AI-driven insights and automation that propel your business forward. With a commitment to staying at the forefront of the rapidly evolving AI market, we deliver tailored solutions that meet your specific needs. Join us on the forefront of technological advancement, and let AI redefine the way you operate and succeed in a competitive landscape. Embrace the future with AI excellence, where possibilities are limitless, and competition is surpassed.