External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054
https://www.theregister.com/2025/04/21/microsoft_apple_patch/
https://thehackernews.com/2025/04/cve-2025-24054-under-active.html
https://www.bleepingcomputer.com/news/security/windows-ntlm-hash-leak-flaw-exploited-in-phishing-attacks-on-governments/
https://www.darkreading.com/cyberattacks-data-breaches/multiple-group-exploiting-ntlm-flaw
https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild/
http://seclists.org/fulldisclosure/2025/Apr/28
Source: Mitre, NVD
Published: 2025-03-11
Updated: 2025-04-28
Known Exploited Vulnerability (KEV)
Base Score: 6.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N
Severity: Medium
Base Score: 5.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
EPSS: 0.20729