First published: Mon Mar 03 2025(Updated: )
Vulnerability of unauthorized exposure of confidential information affecting Advanced IP Scanner and Advanced Port Scanner. It occurs when these applications initiate a network scan, inadvertently sending the NTLM hash of the user performing the scan. This vulnerability can be exploited by intercepting network traffic to a legitimate server or by setting up a fake server, in both local and remote scenarios. This exposure is relevant for both HTTP/HTTPS and SMB protocols.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Advanced IP Scanner | ||
Famatech Advanced Port Scanner |
The vulnerability has not yet been fixed, but the Famatech Corp team is working on it.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1868 is considered a high severity vulnerability due to the unauthorized exposure of confidential NTLM hashes.
To address CVE-2025-1868, it is recommended to update to the latest version of Advanced IP Scanner and Advanced Port Scanner that resolves this issue.
CVE-2025-1868 affects both Advanced IP Scanner and Advanced Port Scanner developed by Famatech.
CVE-2025-1868 exposes the NTLM hash of the user initiating a network scan, which can lead to unauthorized access.
Yes, CVE-2025-1868 can be exploited remotely, making it particularly critical for network security.