The hacking group "Belsen Group" has posted over 15,000 unique FortiGate firewall configurations online. The data dump, reportedly obtained by exploiting...
Microsoft's January Patch Tuesday update fixed 159 vulnerabilities, including 10 critical Remote Code Execution (RCE) issues. These updates are essential...
Fortinet released security patches for a critical vulnerability (CVE-2023-37936) involving a hard-coded cryptographic key. This flaw lets remote, unauthorized attackers...
0patch reports that the issue affects all Windows versions from Windows 7 and Server 2008 R2 up to Windows 11 24H2 and Server 2022, but it currently has no CVE ID.
0patch has not revealed the technical details of the vulnerability until Microsoft issues an official fix to avoid encouraging exploitation.
The researchers noted that the attack occurs just by viewing a specially crafted malicious file in File Explorer, without needing to open it.
“The vulnerability allows an attacker to obtain [the] user’s NTLM credentials by simply having the user view a malicious file in Windows Explorer – e.g., by opening a shared folder or USB disk with such file, or viewing the Downloads folder where such file was previously automatically downloaded from attacker’s web page,” explains 0patch.
0patch is offering a free micropatch for the recent NTLM zero-day to all registered users until Microsoft releases an official fix.
To get the unofficial patch, create a free account on 0patch Central, start a free trial, and install the agent. It will automatically apply the necessary micropatches without needing a reboot.