{"id":33685,"date":"2024-04-04T11:04:15","date_gmt":"2024-04-04T09:04:15","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=33685"},"modified":"2024-10-01T15:25:15","modified_gmt":"2024-10-01T13:25:15","slug":"windows-ntlm-credentials-vulnerability-cve-2024-21320-fix-from-0patch","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/04\/04\/windows-ntlm-credentials-vulnerability-cve-2024-21320-fix-from-0patch\/","title":{"rendered":"Windows NTLM credentials vulnerability CVE-2024-21320: Fix from 0patch"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/04\/04\/windows-ntlm-credentials-schwachstelle-cve-2024-21320-fix-durch-0patch\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]There is a vulnerability in Windows (CVE-2024-21320) that exposes NTLM credentials about Windows topics. Microsoft patched the vulnerability CVE-2024-21320 in January 2024. This patch provides a policy to prevent the exposure of NTLM credentials when theme files are located on network drives. ACROS Security has now released a micropatch for the 0patch agent that generally closes the vulnerability (without registry intervention).<\/p>\n<p><!--more--><\/p>\n<h2>Themes Spoofing (CVE-2024-21320)<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/0f46b5e6a2e34cf98e6b4d3edc857325\" alt=\"\" width=\"1\" height=\"1\" \/>As of January 9, 2024, Microsoft has disclosed the theme spoofing vulnerability <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21320\" target=\"_blank\" rel=\"noopener\">CVE-2024-21320<\/a> in Windows. The vulnerability allows an attacker to obtain a user's NTLM credentials if the victim simply downloads a theme file from or displays such a file in a network folder.<\/p>\n<p>The background to this is that the theme file format allows a .theme file to specify two images, <em>BrandImage<\/em> and <em>Wallpaper<\/em>. If these are on a remote network share, Windows Explorer attempts to load these files automatically as soon as a theme file is downloaded or displayed in a folder. An attacker could exploit this to host images for a theme file on their own network resource. When accessing the images, the user's NTLM credentials are then transmitted, can be intercepted and used to identify the user.<\/p>\n<p>Security researcher Tomer Peled from Akamai discovered the vulnerability, reported it to Microsoft and later published a <a href=\"https:\/\/web.archive.org\/web\/20240502052511\/https:\/\/www.akamai.com\/blog\/security-research\/2024\/mar\/leaking-ntlm-credentials-through-windows-themes\" target=\"_blank\" rel=\"noopener\">detailed article<\/a> and a <a href=\"https:\/\/github.com\/akamai\/akamai-security-research\/tree\/main\/PoCs\/CVE-2024-21320\" target=\"_blank\" rel=\"noopener\">proof of concept<\/a>.<\/p>\n<h2>Microsofts Januar 2024 patch<\/h2>\n<p>As .theme files are generally classified as dangerous, their receipt as an attachment to an email in Microsoft Outlook is already blocked. Microsoft has assigned the Privilege Escalation vulnerability a CVSS 3.1 index of 6.5, but classifies exploitation as unlikely. Systems that have NTLM disabled are not affected. In January 2024, Microsoft then rolled out a security fix for Windows versions in support via an update. The update packages for Windows Server 2012 &#8211; 2022 and Windows 10\/11 clients are listed in the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21320\" target=\"_blank\" rel=\"noopener\">article on CVE-2024-21320<\/a>. If the update is installed, the transmission of the NTLM hash can be prevented by a group policy via registry &#8211; details in the linked article.<\/p>\n<h2>The 0patch solution<\/h2>\n<p>I came across the following <a href=\"https:\/\/twitter.com\/0patch\/status\/1775169198940959203\" target=\"_blank\" rel=\"noopener\">tweet<\/a> from ACROS Security\/0patch, which refers to the blog post <a href=\"https:\/\/blog.0patch.com\/2024\/04\/micropatches-for-leaking-ntlm.html\" target=\"_blank\" rel=\"noopener\">Micropatches for Leaking NTLM Credentials Through Windows Themes (CVE-2024-21320)<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.0patch.com\/2024\/04\/micropatches-for-leaking-ntlm.html\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/i.postimg.cc\/d1Rt6mvS\/image.png\" \/><\/a><\/p>\n<p>The 0patch micropatch is logically identical to Microsoft's, whereby the blocking of images on a network path is hard-coded and cannot or does not have to be configured via the registry. This means that systems without a GPO are protected against this vulnerability. The details can be found in the 0patch blog post above.<\/p>\n<p>You can find information on how the 0patch agent works, which loads the micropatches into the memory of an application at runtime, in the blog posts (e.g. <a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-securing-with-the-0patch-solution-part-2\/\">here<\/a>). Here in the blog, I have often reported on 0patch solutions, which are linked at the end of the blog post <a href=\"https:\/\/borncity.com\/win\/2024\/02\/02\/windows-eventlogcrasher-0-day-vulnerability-crashes-event-logging-0patch-micro-patch-available\/\" rel=\"bookmark\">Windows \"EventLogCrasher\" 0-day vulnerability crashes event logging; 0patch micro-patch available<\/a>.<\/p>\n<p><strong>Similar articles:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/01\/09\/microsoft-security-update-summary-january-9-2024\/\">Microsoft Security Update Summary (January 9, 2024)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/01\/10\/microsoft-security-update-summary-january-9-2024-2\/\">Patchday: Windows 10 Updates (January 9, 2024)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/01\/10\/patchday-windows-11-server-2022-updates-january-9-2024\/\" target=\"_blank\" rel=\"noopener\">Patchday: Windows 11\/Server 2022 Updates (January 9, 2024)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/01\/11\/windows-7-server-2008-r2-server-2012-r2-updates-january-9-2024\/\">Windows 7\/Server 2008 R2; Server 2012 R2: Updates (January 9, 2024)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]There is a vulnerability in Windows (CVE-2024-21320) that exposes NTLM credentials about Windows topics. Microsoft patched the vulnerability CVE-2024-21320 in January 2024. This patch provides a policy to prevent the exposure of NTLM credentials when theme files are located on &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/04\/04\/windows-ntlm-credentials-vulnerability-cve-2024-21320-fix-from-0patch\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[69,194],"class_list":["post-33685","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=33685"}],"version-history":[{"count":2,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33685\/revisions"}],"predecessor-version":[{"id":35186,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33685\/revisions\/35186"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=33685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=33685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=33685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}