External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
References
| Link | Resource |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054 | Vendor Advisory |
| http://seclists.org/fulldisclosure/2025/Apr/28 | Mailing List |
| https://www.vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-detection-script | Exploit Third Party Advisory |
| https://www.vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-mitigation-script | Mitigation Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24054 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-03-11 17:16
Updated : 2025-10-27 17:14
NVD link : CVE-2025-24054
Mitre link : CVE-2025-24054
CVE.ORG link : CVE-2025-24054
JSON object : View
Products Affected
microsoft
- windows_server_2019
- windows_10_22h2
- windows_server_2022
- windows_10_1507
- windows_11_23h2
- windows_11_24h2
- windows_server_2008
- windows_10_1607
- windows_server_2016
- windows_server_2012
- windows_10_1809
- windows_11_22h2
- windows_server_2022_23h2
- windows_server_2025
- windows_10_21h2
CWE
CWE-73
External Control of File Name or Path
