First published: Tue Nov 12 2024(Updated: )
Microsoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open operation. The attacker could then leverage this hash to impersonate that user.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =23H2 | |
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =24H2 | |
Windows 11 | =24H2 | |
Windows 11 | =23H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.10240.20826 | |
Microsoft Windows 10 | <10.0.10240.20826 | |
Microsoft Windows 10 | <10.0.14393.7515 | |
Microsoft Windows 10 | <10.0.14393.7515 | |
Microsoft Windows 10 | <10.0.17763.6532 | |
Microsoft Windows 10 | <10.0.17763.6532 | |
Microsoft Windows 10 | <10.0.19044.5131 | |
Microsoft Windows 10 | <10.0.19044.5131 | |
Microsoft Windows 10 | <10.0.19044.5131 | |
Microsoft Windows 10 | <10.0.19045.5131 | |
Microsoft Windows 10 | <10.0.19045.5131 | |
Microsoft Windows 10 | <10.0.19045.5131 | |
Windows 11 | <10.0.22621.4460 | |
Windows 11 | <10.0.22621.4460 | |
Windows 11 | <10.0.22631.4460 | |
Windows 11 | <10.0.22631.4460 | |
Windows 11 | <10.0.26100.2314 | |
Windows 11 | <10.0.26100.2314 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | <10.0.14393.7515 | |
Microsoft Windows Server 2019 | <10.0.17763.6532 | |
Microsoft Windows Server 2022 | <10.0.20348.2849 | |
Microsoft Windows Server 2022 | <10.0.25398.1251 | |
Microsoft Windows Server 2025 | <10.0.26100.2314 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | ||
Windows 10 | ||
Microsoft Windows Operating System |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43451 has a high severity rating due to the potential for NTLMv2 hash disclosure that can lead to user impersonation.
To mitigate CVE-2024-43451, apply the latest security patches provided by Microsoft for the affected Windows versions.
CVE-2024-43451 affects various Windows versions including Windows 10 (all supported versions), Windows Server 2019, Windows 11, and Windows Server 2022.
An attacker can exploit CVE-2024-43451 by tricking users into performing file operations that inadvertently disclose their NTLMv2 password hashes.
While the recommended solution is to apply updates, if immediate patching is not possible, limiting access to vulnerable file operations may serve as a temporary workaround.