Get a demo

Voyager18 (research)

Prevent credential theft: Address Microsoft NTLM Zero-Day Threat

In the rapidly evolving world of cybersecurity, legacy protocols often present critical vulnerabilities that attackers exploit to compromise systems. One such threat has been identified in Microsoft’s NTLM authentication protocol. With NTLM being a legacy standard, the exploitation of its weaknesses, especially in relay attacks, underscores the need for swift and robust mitigation measures. This blog post delves into the details of the recently disclosed NTLM Zero-Day, its implications, and how organizations can safeguard against this risk.

Yair Divinsky | December 12, 2024

 

TL;DR

Legacy protocols often present critical vulnerabilities that attackers exploit to compromise systems. One such threat has been identified in Microsoft’s NTLM authentication protocol.

With NTLM being a legacy standard, the exploitation of its weaknesses, especially in relay attacks, underscores the need for swift and robust mitigation measures. This blog post delves into the details of the recently disclosed NTLM Zero-Day, its implications, and how organizations can safeguard against this risk.

While Microsoft has already announced its plans to kill off the NTLM authentication protocol in Windows 11 in the future, 0patch notes that this is the third zero-day vulnerability they recently reported to the software giant, wich the vendor has not taken immediate action to address.

 

What is the Microsoft NTLM Zero-Day?

ACROS Security researchers have discovered a zero-day vulnerability present in all currently supported versions of Windows. This flaw enables attackers to capture a user’s NTLM credentials by tricking them into opening a malicious file through the Windows Explorer file manager.

The NTLM Zero-Day vulnerability represents a significant threat due to its ability to facilitate NTLM relay attacks. These attacks exploit the NTLM protocol’s lack of robust security mechanisms, allowing attackers to impersonate authenticated users. By intercepting and relaying authentication requests, attackers can gain unauthorized access to systems, potentially leading to complete domain compromise.

Historically, NTLM relay attacks have been a favored method for adversaries, as they exploit weak security settings in widely used services like Exchange Server, Active Directory Certificate Services (AD CS), and Lightweight Directory Access Protocol (LDAP).

This particular Zero-Day vulnerability emphasizes the critical need for default security mechanisms that defend against such exploitation.

 

Technical overview

At its core, an NTLM relay attack involves two critical steps:

  1. Coercion: The attacker tricks a victim into authenticating with a rogue endpoint by embedding malicious links or exploiting protocol weaknesses.

  2. Relaying: The captured authentication credentials are forwarded to a legitimate target service vulnerable to NTLM relaying.

This vulnerability enables attackers to authenticate on behalf of the victim and execute commands with the same privileges, compromising the target service.

In response, Microsoft has emphasized Extended Protection for Authentication (EPA), a mitigation mechanism that strengthens authentication by binding the NTLM authentication process to specific endpoints.

By enabling EPA by default in Exchange Server 2019 (CU14) and Windows Server 2025, Microsoft has significantly reduced the risk of NTLM relay attacks in environments leveraging these services.

 

Does the Microsoft NTLM Zero-Day Affect Me?

Organizations utilizing on-premises Exchange Server, AD CS, or LDAP are particularly at risk. These services are commonly targeted by NTLM relay attacks due to their widespread use and the potential access they provide to critical resources.

Key indicators of vulnerability include:

  • Older versions of Exchange Server without EPA enabled by default.

  • Active Directory environments relying on AD CS without channel binding.

  • LDAP configurations lacking channel binding settings.

For organizations using legacy systems, it is imperative to assess configurations and ensure that NTLM mitigations are enabled where possible. Vulnerable environments can be identified through auditing tools or Microsoft-provided guidance.

 

Has the Microsoft NTLM Zero-Day Been Actively Exploited in the Wild?

While Microsoft has not reported active exploitation of this specific Zero-Day at the time of publication, NTLM relay attacks are a well-documented tactic employed by threat actors. Notable examples include CVE-2023-23397, where Outlook vulnerabilities were used to relay credentials to Exchange Server, and CVE-2021-36942, which targeted AD CS.

The recurrence of such attacks highlights the critical need for preemptive security measures to prevent potential exploitation. Organizations are urged to proactively implement the latest updates and monitor for unusual authentication behavior that could indicate relaying activities.

 

How to Mitigate the Microsoft NTLM Zero-Day

To safeguard against NTLM relay attacks and this Zero-Day vulnerability, organizations should adopt the following measures:

  • Enable EPA by Default – Ensure Exchange Server 2019 (CU14) is updated to enable EPA. For Exchange Server 2016, scripts provided by Microsoft can be used to activate EPA manually.

  • Update to Windows Server 2025 – This version includes EPA and channel binding enabled by default for AD CS and LDAP. These changes significantly reduce the attack surface for NTLM relay threats.

  • Audit NTLM Usage – Leverage auditing tools to identify systems still relying on NTLM and plan a transition to more secure authentication protocols like Kerberos.

  • Harden LDAP Configurations: Configure LDAP to enforce channel binding and monitor for legacy clients that may not support these settings.

  • Remove NTLM Dependencies – Begin migrating services away from NTLM to reduce reliance on this legacy protocol and minimize exposure to its vulnerabilities.

Microsoft has provided detailed documentation on these steps, ensuring organizations have the resources to address NTLM relay risks effectively.

 

Conclusions

This Zero-day follows another security flaw CVE-2024-43451, an NTLM Hash Disclosure spoofing vulnerability reported by ClearSky security researchers exploited in the wild. If exploited, the flaw would allow to steal the logged-in user’s NTLMv2 hash by forcing connections to a remote attacker-controlled server.

The NTLM Zero-Day underscores the importance of proactive security measures and the elimination of legacy protocol dependencies. Microsoft’s introduction of EPA by default for critical services like Exchange Server, AD CS, and LDAP marks a significant step forward in hardening against NTLM relay attacks.

However, organizations must also take ownership of their security posture by updating to supported software versions, enabling mitigations, and transitioning to modern authentication protocols. By addressing NTLM vulnerabilities now, enterprises can stay ahead of attackers and secure their environments against future threats.

For more technical insights, consult Microsoft’s official blog post on NTLM Relay Mitigations.

 

Further reading

Each new vulnerability is a reminder of where we stand, and what we need to do better. Check out the following resources to help you maintain cyber hygiene and stay ahead of the threat actors:

    1. Q3 2024 Vulnerability Watch
    2. IBM’s Cost of a Data Breach 2024: What we learned
    3. Fixing the RCE flaw in the Common Unix Printing System (CUPS)
    4. Vulnerability disclosure policy (and how to get it right)
    5. OpenSSH again? How to fix CVE-2024-7589

Get rid of silos;

Start owning exposure risk

Test drive the leader in exposure risk management