Cybersecurity researcher Jeremiah Fowler discovered an unsecured database with 170,360 records belonging to a real estate company. It contained personal...
GreyNoise found attempts to exploit CVE-2023-28771, a vulnerability in Zyxel's IKE affecting UDP port 500. The attack centers around CVE-2023-28771,...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently included two high-risk vulnerabilities in its Known Exploited Vulnerabilities (KEV)...
SoftBank has disclosed that personal information of more than 137,000 mobile subscribers—covering names, addresses, and phone numbers—might have been leaked...
0patch reports that the issue affects all Windows versions from Windows 7 and Server 2008 R2 up to Windows 11 24H2 and Server 2022, but it currently has no CVE ID.
0patch has not revealed the technical details of the vulnerability until Microsoft issues an official fix to avoid encouraging exploitation.
The researchers noted that the attack occurs just by viewing a specially crafted malicious file in File Explorer, without needing to open it.
0patch
“The vulnerability allows an attacker to obtain [the] user’s NTLM credentials by simply having the user view a malicious file in Windows Explorer – e.g., by opening a shared folder or USB disk with such file, or viewing the Downloads folder where such file was previously automatically downloaded from attacker’s web page,” explains 0patch.
0patch is offering a free micropatch for the recent NTLM zero-day to all registered users until Microsoft releases an official fix.
To get the unofficial patch, create a free account on 0patch Central, start a free trial, and install the agent. It will automatically apply the necessary micropatches without needing a reboot.