Cybersecurity expert, Jeremiah Fowler discovered an unsecured database containing almost 5 million records reportedly relating to Care1 — a Canadian...
0patch reports that the issue affects all Windows versions from Windows 7 and Server 2008 R2 up to Windows 11 24H2 and Server 2022, but it currently has no CVE ID.
0patch has not revealed the technical details of the vulnerability until Microsoft issues an official fix to avoid encouraging exploitation.
The researchers noted that the attack occurs just by viewing a specially crafted malicious file in File Explorer, without needing to open it.
“The vulnerability allows an attacker to obtain [the] user’s NTLM credentials by simply having the user view a malicious file in Windows Explorer – e.g., by opening a shared folder or USB disk with such file, or viewing the Downloads folder where such file was previously automatically downloaded from attacker’s web page,” explains 0patch.
0patch is offering a free micropatch for the recent NTLM zero-day to all registered users until Microsoft releases an official fix.
To get the unofficial patch, create a free account on 0patch Central, start a free trial, and install the agent. It will automatically apply the necessary micropatches without needing a reboot.