Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-24071
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Microsoft Windows File Explorer Spoofing Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows File Explorer 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows File Explorer是美国微软(Microsoft)公司的一个文件管理器应用程序。 Microsoft Windows File Explorer存在信息泄露漏洞。攻击者利用该漏洞可以获取敏感信息。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows Server 2019,Windows Server
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
MicrosoftWindows 10 Version 1507 10.0.10240.0 ~ 10.0.10240.20947 -
MicrosoftWindows 10 Version 1607 10.0.14393.0 ~ 10.0.14393.7876 -
MicrosoftWindows 10 Version 1809 10.0.17763.0 ~ 10.0.17763.7009 -
MicrosoftWindows 10 Version 21H2 10.0.19044.0 ~ 10.0.19044.5608 -
MicrosoftWindows 10 Version 22H2 10.0.19045.0 ~ 10.0.19045.5608 -
MicrosoftWindows 11 version 22H2 10.0.22621.0 ~ 10.0.22621.5039 -
MicrosoftWindows 11 version 22H3 10.0.22631.0 ~ 10.0.22631.5039 -
MicrosoftWindows 11 Version 23H2 10.0.22631.0 ~ 10.0.22631.5039 -
MicrosoftWindows 11 Version 24H2 10.0.26100.0 ~ 10.0.26100.3476 -
MicrosoftWindows Server 2012 R2 6.3.9600.0 ~ 6.3.9600.22470 -
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.9600.0 ~ 6.3.9600.22470 -
MicrosoftWindows Server 2016 10.0.14393.0 ~ 10.0.14393.7876 -
MicrosoftWindows Server 2016 (Server Core installation) 10.0.14393.0 ~ 10.0.14393.7876 -
MicrosoftWindows Server 2019 10.0.17763.0 ~ 10.0.17763.7009 -
MicrosoftWindows Server 2019 (Server Core installation) 10.0.17763.0 ~ 10.0.17763.7009 -
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.3328 -
MicrosoftWindows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.0 ~ 10.0.25398.1486 -
MicrosoftWindows Server 2025 10.0.26100.0 ~ 10.0.26100.3476 -
MicrosoftWindows Server 2025 (Server Core installation) 10.0.26100.0 ~ 10.0.26100.3476 -
II. Public POCs for CVE-2025-24071
#POC DescriptionSource LinkShenlong Link
1CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms Filehttps://github.com/0x6rss/CVE-2025-24071_PoCPOC Details
2metasploit module for the CVE-2025-24071https://github.com/FOLKS-iwd/CVE-2025-24071-msfvenomPOC Details
3Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)https://github.com/aleongx/CVE-2025-24071POC Details
4Alternativa CVE-2025-24071_PoChttps://github.com/ctabango/CVE-2025-24071_PoCExtraPOC Details
5Exploit CVE-2025-24071https://github.com/shacojx/CVE-2025-24071-ExploitPOC Details
6Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)https://github.com/ThemeHackers/CVE-2025-24071POC Details
7Nonehttps://github.com/rubbxalc/CVE-2025-24071POC Details
8A PoC of CVE-2025-24071, A windows vulnerability that allow get NTMLv2 hasheshttps://github.com/Marcejr117/CVE-2025-24071_PoCPOC Details
9Nonehttps://github.com/cesarbtakeda/Windows-Explorer-CVE-2025-24071POC Details
10Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20%E6%96%87%E4%BB%B6%E8%B5%84%E6%BA%90%E7%AE%A1%E7%90%86%E5%99%A8%E6%AC%BA%E9%AA%97%E6%BC%8F%E6%B4%9E%20CVE-2025-24071.mdPOC Details
11Nonehttps://github.com/pswalia2u/CVE-2025-24071_POCPOC Details
12Windows File Explorer Spoofing Vulnerability - CVE-2025-24071https://github.com/f4dee-backup/CVE-2025-24071POC Details
13CVE-2025-24071 Proof Of Concepthttps://github.com/LOOKY243/CVE-2025-24071-PoCPOC Details
14Exploited CVE-2025-24071 via SMB by hosting a .library-ms file inside a .tar archive. Using tar x from smbclient, the payload is extracted server-side without user interaction. Responder captures the NTLM hash once the target accesses the library.https://github.com/ex-cal1bur/SMB_CVE-2025-24071POC Details
15Security Vulnerability Report: CVE-2025-24071 - Windows File Explorer Spoofing Vulnerabilityhttps://github.com/TH-SecForge/CVE-2025-24071POC Details
16CVE-2025-24071https://github.com/B1ack4sh/Blackash-CVE-2025-24071POC Details
17CVE-2025-24071: NTLMv2 Hash Disclosure via .library-ms Filehttps://github.com/DeshanFer94/CVE-2025-24071-POC-NTLMHashDisclosure-POC Details
18Nonehttps://github.com/Royall-Researchers/CVE-2025-24071POC Details
19Python script to execute CVE-2025-24071https://github.com/AC8999/CVE-2025-24071POC Details
20CVE-2025-24071https://github.com/Ashwesker/Blackash-CVE-2025-24071POC Details
21This is a python PoC scripts for CVE-2025-24071 which is a vulnerability in Windows File Explorer that allows unauthorized access to sensitive information like NTLM Exposure.https://github.com/Abdelrahman0Sayed/CVE-2025-24071POC Details
22Hello friend. This is the Fsociety Exploit Framework for CVE-2025-24071. Generates malicious .library-ms files to steal NTLMv2 hashes. Includes a 'Living Terminal' Cinematic Mode, Deep Trace logging, and stealth evasion techniques. Join the revolution. #Hacking #Exploit #CVE-2025-24071 https://github.com/fsoc-ghost-0x/Fsociety-CVE-2025-24071-NTLM-CoercionPOC Details
23Exploit CVE-2025-24071https://github.com/ephunter/CVE-2025-24071-ExploitPOC Details
24CVE-2025-24071https://github.com/Ashwesker/Ashwesker-CVE-2025-24071POC Details
25CVE-2025-24071https://github.com/zbs54/Blackash-CVE-2025-24071POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-24071
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-24071

No comments yet


Leave a comment