Patch Now: Critical Windows Vulnerability CVE-2025-24054 Actively Exploited in the Wild

The CyberSec Guru

CVE-2025-24054

If you like this post, then please share it:

Buy me A Coffee!

Support The CyberSec Guru’s Mission

🔐 Fuel the cybersecurity crusade by buying me a coffee! Why your support matters: Zero paywalls: Keep the main content 100% free for learners worldwide, Writeup Access: Get complete in-depth writeup with scripts access within 12 hours of machine drop.

“Your coffee keeps the servers running and the knowledge flowing in our fight against cybercrime.”☕ Support My Work

Buy Me a Coffee Button

Heads up for all Windows users and IT administrators: a significant vulnerability in Windows File Explorer is being actively exploited by attackers. This vulnerability, now tracked as CVE-2025-24054, was initially assigned the identifier CVE-2025-24071.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this flaw to its Known Exploited Vulnerabilities (KEV) catalog, signaling that it is a clear and present danger.

Here’s what you need to know to protect yourself.

What is CVE-2025-24054?

CVE-2025-24054 is a high-impact spoofing and sensitive information disclosure vulnerability in Windows File Explorer. It allows an attacker to steal a user’s NTLM hash, which is a hashed version of their Windows password.

The vulnerability is particularly dangerous because it requires very little user interaction—no clicking on strange executables or ignoring security warnings. The simple act of extracting a malicious ZIP or RAR archive is enough to trigger the exploit.

How Does the Attack Work?

The attack chain is both clever and alarming:

  1. Delivery: An attacker sends a user a seemingly harmless archive file (like a .zip or .rar) via a phishing email or a malicious download.
  2. The Bait: Inside this archive is a specially crafted file with a .library-ms extension. These are normally benign Windows Library files.
  3. The Trap: This malicious .library-ms file contains a path pointing to an SMB server controlled by the attacker.
  4. The Exploit: When the user extracts the archive, the Windows File Explorer’s preview or indexing mechanism automatically parses the .library-ms file to gather information. This action, which happens in the background without the user even opening the file, causes the system to automatically try to authenticate with the attacker’s SMB server.
  5. Theft: This authentication attempt sends the user’s NTLMv2 hash directly to the attacker.

What’s the Impact of a Stolen NTLM Hash?

An NTLM hash is not the user’s plaintext password, but it’s the next best thing for an attacker. With this hash, an attacker can:

  • Offline Cracking: Use powerful computers to “crack” the hash and discover the original plaintext password.
  • Pass-the-Hash (PtH) Attacks: In many network environments, an attacker can use the hash itself (without ever knowing the password) to impersonate the user and move laterally through a network, accessing other machines and servers.

This makes the vulnerability a critical entry point for wider network compromise.

Who is Affected?

This vulnerability affects a wide range of Microsoft products, including:

  • Windows 10 (various versions)
  • Windows 11 (various versions)
  • Windows Server 2016, 2019, and 2022

Given the broad range of affected systems, it is safe to assume all modern Windows clients and servers are at risk until patched.

How to Protect Yourself: Patch Immediately

The solution is straightforward and urgent: Apply the security updates released by Microsoft during the March 2025 Patch Tuesday.

Microsoft has addressed this vulnerability, and installing the latest Windows updates is the only way to fully mitigate the threat.

Due to its inclusion in the CISA KEV catalog, this is not a patch to be delayed. Attackers are actively using this exploit, and any unpatched system is a target.

Steps to Take:

  1. Prioritize Patching: Use Windows Update or your organization’s patch management system to deploy the March 2025 (or later) security updates immediately.
  2. Educate Users: Remind users to be extremely cautious of unsolicited ZIP or RAR attachments, even if they appear to come from a known source.
  3. Monitor for Suspicious Activity: Security teams should monitor for unusual outbound SMB traffic (TCP port 445) from workstations, as this could be a sign of an attempted exploit.

Don’t wait for a compromise. The threat is active, and the solution is available. Patch your systems now.

Buy me A Coffee!

Support The CyberSec Guru’s Mission

🔐 Fuel the cybersecurity crusade by buying me a coffee! Your contribution powers free tutorials, hands-on labs, and security resources.

Why your support matters:
  • Writeup Access: Get complete writeup access within 12 hours
  • Zero paywalls: Keep the main content 100% free for learners worldwide

Perks for one-time supporters:
☕️ $5: Shoutout in Buy Me a Coffee
🛡️ $8: Fast-track Access to Live Webinars
💻 $10: Vote on future tutorial topics + exclusive AMA access

“Your coffee keeps the servers running and the knowledge flowing in our fight against cybercrime.”☕ Support My Work

Buy Me a Coffee Button

If you like this post, then please share it:

Exploits

Discover more from The CyberSec Guru

Subscribe to get the latest posts sent to your email!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from The CyberSec Guru

Subscribe now to keep reading and get access to the full archive.

Continue reading