目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2025-24071 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Microsoft Windows File Explorer Spoofing Vulnerability
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
信息暴露
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Microsoft Windows File Explorer 信息泄露漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Microsoft Windows File Explorer是美国微软(Microsoft)公司的一个文件管理器应用程序。 Microsoft Windows File Explorer存在信息泄露漏洞。攻击者利用该漏洞可以获取敏感信息。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows Server 2019,Windows Server
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
MicrosoftWindows 10 Version 1507 10.0.10240.0 ~ 10.0.10240.20947 -
MicrosoftWindows 10 Version 1607 10.0.14393.0 ~ 10.0.14393.7876 -
MicrosoftWindows 10 Version 1809 10.0.17763.0 ~ 10.0.17763.7009 -
MicrosoftWindows 10 Version 21H2 10.0.19044.0 ~ 10.0.19044.5608 -
MicrosoftWindows 10 Version 22H2 10.0.19045.0 ~ 10.0.19045.5608 -
MicrosoftWindows 11 version 22H2 10.0.22621.0 ~ 10.0.22621.5039 -
MicrosoftWindows 11 version 22H3 10.0.22631.0 ~ 10.0.22631.5039 -
MicrosoftWindows 11 Version 23H2 10.0.22631.0 ~ 10.0.22631.5039 -
MicrosoftWindows 11 Version 24H2 10.0.26100.0 ~ 10.0.26100.3476 -
MicrosoftWindows Server 2012 R2 6.3.9600.0 ~ 6.3.9600.22470 -
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.9600.0 ~ 6.3.9600.22470 -
MicrosoftWindows Server 2016 10.0.14393.0 ~ 10.0.14393.7876 -
MicrosoftWindows Server 2016 (Server Core installation) 10.0.14393.0 ~ 10.0.14393.7876 -
MicrosoftWindows Server 2019 10.0.17763.0 ~ 10.0.17763.7009 -
MicrosoftWindows Server 2019 (Server Core installation) 10.0.17763.0 ~ 10.0.17763.7009 -
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.3328 -
MicrosoftWindows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.0 ~ 10.0.25398.1486 -
MicrosoftWindows Server 2025 10.0.26100.0 ~ 10.0.26100.3476 -
MicrosoftWindows Server 2025 (Server Core installation) 10.0.26100.0 ~ 10.0.26100.3476 -
二、漏洞 CVE-2025-24071 的公开POC
#POC 描述源链接神龙链接
1CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms Filehttps://github.com/0x6rss/CVE-2025-24071_PoCPOC详情
2metasploit module for the CVE-2025-24071https://github.com/FOLKS-iwd/CVE-2025-24071-msfvenomPOC详情
3Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)https://github.com/aleongx/CVE-2025-24071POC详情
4Alternativa CVE-2025-24071_PoChttps://github.com/ctabango/CVE-2025-24071_PoCExtraPOC详情
5Exploit CVE-2025-24071https://github.com/shacojx/CVE-2025-24071-ExploitPOC详情
6Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)https://github.com/ThemeHackers/CVE-2025-24071POC详情
7Nonehttps://github.com/rubbxalc/CVE-2025-24071POC详情
8A PoC of CVE-2025-24071, A windows vulnerability that allow get NTMLv2 hasheshttps://github.com/Marcejr117/CVE-2025-24071_PoCPOC详情
9Nonehttps://github.com/cesarbtakeda/Windows-Explorer-CVE-2025-24071POC详情
10Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20%E6%96%87%E4%BB%B6%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E5%99%A8%E6%AC%BA%E9%AA%97%E6%BC%8F%E6%B4%9E%20CVE-2025-24071.mdPOC详情
11Nonehttps://github.com/pswalia2u/CVE-2025-24071_POCPOC详情
12Windows File Explorer Spoofing Vulnerability - CVE-2025-24071https://github.com/f4dee-backup/CVE-2025-24071POC详情
13CVE-2025-24071 Proof Of Concepthttps://github.com/LOOKY243/CVE-2025-24071-PoCPOC详情
14Exploited CVE-2025-24071 via SMB by hosting a .library-ms file inside a .tar archive. Using tar x from smbclient, the payload is extracted server-side without user interaction. Responder captures the NTLM hash once the target accesses the library.https://github.com/ex-cal1bur/SMB_CVE-2025-24071POC详情
15Security Vulnerability Report: CVE-2025-24071 - Windows File Explorer Spoofing Vulnerabilityhttps://github.com/TH-SecForge/CVE-2025-24071POC详情
16CVE-2025-24071https://github.com/B1ack4sh/Blackash-CVE-2025-24071POC详情
17CVE-2025-24071: NTLMv2 Hash Disclosure via .library-ms Filehttps://github.com/DeshanFer94/CVE-2025-24071-POC-NTLMHashDisclosure-POC详情
18Nonehttps://github.com/Royall-Researchers/CVE-2025-24071POC详情
19Python script to execute CVE-2025-24071https://github.com/AC8999/CVE-2025-24071POC详情
20CVE-2025-24071https://github.com/Ashwesker/Blackash-CVE-2025-24071POC详情
21This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure.https://github.com/Abdelrahman0Sayed/CVE-2025-24071POC详情
22Hello friend. This is the Fsociety Exploit Framework for CVE-2025-24071. Generates malicious .library-ms files to steal NTLMv2 hashes. Includes a 'Living Terminal' Cinematic Mode, Deep Trace logging, and stealth evasion techniques. Join the revolution. #Hacking #Exploit #CVE-2025-24071 https://github.com/fsoc-ghost-0x/Fsociety-CVE-2025-24071-NTLM-CoercionPOC详情
23Exploit CVE-2025-24071https://github.com/ephunter/CVE-2025-24071-ExploitPOC详情
24CVE-2025-24071https://github.com/Ashwesker/Ashwesker-CVE-2025-24071POC详情
25CVE-2025-24071https://github.com/zbs54/Blackash-CVE-2025-24071POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2025-24071 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-24071

暂无评论


发表评论