{"id":37897,"date":"2025-04-30T00:01:46","date_gmt":"2025-04-29T22:01:46","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=37897"},"modified":"2025-04-29T16:48:01","modified_gmt":"2025-04-29T14:48:01","slug":"confusion-about-0-click-ntlm-authentication-bypass-telnet-in-windows","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/04\/30\/confusion-about-0-click-ntlm-authentication-bypass-telnet-in-windows\/","title":{"rendered":"Confusion about 0-Click-NTLM Authentication Bypass (Telnet) in Windows"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px; display: inline; float: left;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/04\/29\/verwirrung-um-0-click-ntlm-authentication-bypass-telnet-in-windows\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]I have just come across information about a vulnerability in the Microsoft Telnet server. The vulnerability is said to allow a -Click-NTLM Authentication Bypass. Fortunately, only old systems up to Windows Server 2008 R2 are affected. Telnet should be deactivated an such old Windows servers, in case, it's activated.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/b0f13494027e400c8c575a924a632b4e\" alt=\"\" width=\"1\" height=\"1\" \/>A blog reader pointed out yesterday the following tweet to me in a private message on X. It reads somewhat alarmingly.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"0-Click NTLM Authentication Bypass\" src=\"https:\/\/i.postimg.cc\/T3v9mXZF\/image.png\" alt=\"0-Click NTLM Authentication Bypass\" width=\"607\" height=\"488\" \/><\/p>\n<p>There is a 0-Click NTLM Authentication Bypass vulnerability in the Microsoft Telnet Server. A proof of concept (PoC) has since been published, but there is no patch. The linked article headlines in the screenshot above that Microsoft Telnet is vulnerable to a 0-click vulnerability and requires immediate action.<\/p>\n<p>Sounded quite alarming &#8211; the above tweet links to the article <a href=\"https:\/\/securityonline.info\/0-click-ntlm-authentication-bypass-hits-microsoft-telnet-server-poc-releases-no-patch\/\" target=\"_blank\" rel=\"noopener\">0-Click NTLM Authentication Bypass Hits Microsoft Telnet Server, PoC Releases, No Patch<\/a> from Security Online. The article author refers to a GitHub post by <em>hackerhouse-opensource<\/em>, which has since been deleted. However, I found the article in the <a href=\"https:\/\/web.archive.org\/web\/20250429011459\/https:\/\/github.com\/hackerhouse-opensource\/hfwintelnet\" target=\"_blank\" rel=\"noopener\">Internet Archive<\/a>.<\/p>\n<p>Under the heading <em>Microsoft Telnet Server MS-TNAP Authentication Bypass [RCE 0day]<\/em> it is stated that there is a critical 0-click remote authentication bypass vulnerability in the Microsoft Telnet Server. This allows attackers to gain access to systems as any user (including as an administrator) without valid credentials. The vulnerability exploits a misconfiguration in the NTLM authentication processes of the Telnet extension MS-TNAP, which allows unauthenticated attackers to remotely bypass authentication.<\/p>\n<p>A proof of concept (PoC) exploit for this authentication bypass vulnerability, which is classified as critical in the implementation of NTLM authentication via MS-TNAP in Microsoft Telnet Server, was presented in the repository.<\/p>\n<p>However, the a non warning can be given very quickly. This is because the vulnerability allows authentication to be completely bypassed by manipulating the mutual authentication process. However, this only affects very old systems from Windows 2000 to Windows Server 2008 R2, which have long since fallen out of regular support and are still receiving ESU support and updates as Windows Server 2008 R2. Anyone who still operates such a server that is accessible from \"outside\" via the network should check and deactivate the Telnet server. Telnet server is not activated on install of such Windows systems, afaik.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]I have just come across information about a vulnerability in the Microsoft Telnet server. The vulnerability is said to allow a -Click-NTLM Authentication Bypass. Fortunately, only old systems up to Windows Server 2008 R2 are affected. Telnet should be deactivated &hellip; <a href=\"https:\/\/borncity.com\/win\/2025\/04\/30\/confusion-about-0-click-ntlm-authentication-bypass-telnet-in-windows\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[194],"class_list":["post-37897","post","type-post","status-publish","format-standard","hentry","category-windows","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=37897"}],"version-history":[{"count":2,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37897\/revisions"}],"predecessor-version":[{"id":37899,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37897\/revisions\/37899"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=37897"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=37897"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=37897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}