A critical zero-click NTLM relay vulnerability is affecting Windows Telnet servers, allowing unauthenticated attackers to execute arbitrary code remotely without user interaction. A Proof-of-Concept (PoC) exploit has been publicly released, heightening the urgency, while no official patch from Microsoft is available at this point. The flaw impacts systems where the Telnet service is exposed and enabled.
The vulnerability stems from a critical misconfiguration in how the Telnet server initializes and processes NTLM-based authentication. Specifically:
Outlined by Hacker Fantastic, the exploitation chain proceeds as follows:
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn.
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy