Security
Headlines
HeadlinesLatestCVEs

Headline

Recurring Windows Flaw Could Expose User Credentials

Now a zero-day, the vulnerability enables NTLM hash theft, an issue that Microsoft has already fixed twice before.

DARKReading
#vulnerability#web#windows#microsoft#git#auth#zero_day

Source: tdhster via Shutterstock

All versions of Windows clients, from Windows 7 through current Windows 11 versions, contain a 0-day vulnerability that could allow attackers to capture NTLM authentication hashes from users of affected systems.

Researchers at ACROS Security reported the flaw to Microsoft this week. They discovered the issue while writing a patch for older Windows systems for CVE-2024-38030, a medium-severity Windows Themes spoofing vulnerability that Microsoft mitigated in its July security update.

Variant of Two Previous Vulnerabilities

The vulnerability that ACROS discovered is very similar to CVE-2024-38030 and enables what is known as an authentication coercion attack, where a vulnerable device is essentially coerced into sending NTLM hashes — the cryptographic representation of a user’s password — to an attacker’s system. Akamai researcher Tomer Peled discovered CVE-2024-38030 while analyzing Microsoft’s fix for CVE-2024-21320, another, earlier Windows themes spoofing vulnerability he discovered and reported to Microsoft. The flaw that ACROS uncovered is a new, separate vulnerability related to the two flaws Peled reported earlier.

Windows themes files allow users to customize the appearance of their Windows desktop interface via wallpapers, screen savers, colors, and sounds. Both the vulnerabilities that Akamai researcher Peled discovered had to do with the manner in which the themes handled file paths to a couple of image resources, specifically “BrandImage” or “Wallpaper.” Peled found that because of improper validation, an attacker could manipulate the legitimate path to these resources in such a way as to get Windows to automatically send an authenticated request, along with the user’s NTLM hash, to the attacker’s device.

As Peled explains to Dark Reading, “The themes file format is an .ini file, with multiple ‘key,value’ pairs. I originally found two key,value pairs that could accept file paths,” he says.

The original vulnerability (CVE-2024-21320) stemmed from the fact that the key,value pairs accepted UNC paths — a standardized format for identifying network resources like shared files and folders — for network drives, Peled notes. “This [meant] that a weaponized theme file, with a UNC path, could trigger an outbound connection with user authentication, without them knowing.” Microsoft fixed the issue by adding a check on the file path to ensure it wasn’t a UNC path. But, Peled says, the function Microsoft used for this validation allowed for some bypasses, which is what led to Peled’s discovery of the second vulnerability (CVE-2024-38030).

Microsoft Will Act ‘As Needed’

What ACROS Security reported this week is the third Windows themes spoofing vulnerability rooted in the same file path issue. “Our researchers discovered the vulnerability in early October while writing a patch for CVE-2024-38030 intended for legacy Windows systems many of our users are still using,” says Mitja Kolsek, CEO of ACROS Security. “We reported this issue to Microsoft [on] Oct. 28, 2024, but we did not release details or a proof-of-concept, which we plan to do after Microsoft has made their own patch publicly available.”

A Microsoft spokesman said via email the company is aware of the ACROS report and “will take action as needed to help keep customers protected.” The company does not appear to have issued a CVE, or vulnerability identifier, for the new issue yet.

Like the two previous Windows themes spoofing vulnerabilities that Akamai discovered, the new one that ACROS found also does not require an attacker to have any special privileges. “But they have to somehow get the user to copy a theme file to some other folder on their computer, then open that folder with Windows Explorer using a view that renders icons,” Kolsek says. “The file could also be automatically downloaded to their Downloads folder while visiting [an] attacker’s website, in which case the attacker would have to wait for the user to view the Downloads folder at a later time.”

Kolsek recommends that organizations disable NTLM where possible, but acknowledges that doing so could cause functional problems if any network components rely on it. "[An] attacker could only successfully target a computer where NTLM is enabled," he says. “Another requirement is that a request initiated by a malicious theme file would be able to reach the attacker’s server on the Internet or in an adjacent network,” something that firewalls should typically block, he says. As a result, it’s more likely than an attacker would try to exploit the flaw in a targeted campaign more so than in a mass exploit.

Akamai’s Peled says it’s hard to know what ACROS’s vulnerability is about without having access to the technical details. “But it might be another UNC bypass that circumvents the check, or it could be a different key,value pair that was missed in the original patching,” he says. “UNC path formats are very complex and allow for weird combinations, which make detecting them very hard. This might be why it’s so complex to fix.”

About the Author

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master’s degree in Statistics and lives in Naperville, Ill.

DARKReading: Latest News

Apple Urgently Patches Actively Exploited Zero-Days