Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Data Breach

CISA Flags Highly Exploitable Windows SMB Flaw

Cyberinchief by Cyberinchief
October 22, 2025
Reading Time: 2 mins read
0
CISA Flags Highly Exploitable Windows SMB Flaw


RELATED POSTS

UK Hospital Asks Court to Stymie Ransomware Data Leak

These five countries recorded the most third-party data breaches last year

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

Security Operations

NTLM Reflection Attack Strikes Again

Greg Sirico •
October 21, 2025    

CISA Flags Highly Exploitable Windows SMB Flaw
Image: Afansev Ivan/Shutterstock

A three-month old flaw in a network protocol for file sharing used by Microsoft is under active exploitation, warns the U.S. Cybersecurity and Infrastructure Security Agency.

See Also: Neutralizing the Risk of Compromised Credentials

CISA on Monday gave federal agencies 21 days to apply patches for CVE-2025-33073, an improper access control vulnerability residing on the client side of Server Message Block messages.

Microsoft in June published a patch for the vulnerability, warning that attackers could use the CVSS 8.8 flaw to obtain system privileges. An attacker could send a script forcing a victim machine to connect to an attacker-controlled server and authenticate to it. The flaw’s exploitation bypasses mitigations Microsoft has built over the years to prevent NTLM reflection attacks, although it fails in networks that enforce SMB signing, wrote researchers from Synacktiv in analysis published earlier this year.

Buy JNews
ADVERTISEMENT

NTLM is Microsoft’s legacy authentication protocol, introduced in 1993 as “New Technology LAN Manager.” The computing giant is deprecating NTLM in favor of the more secure Kerberos authentication protocol. NTLM persists, whether because its hardcoded into servers or because it’s still the authentication protocol for Windows peer-to-peer workgroups. Synacktiv researchers discovered they could exploit CVE-2025-33073 despite Kerberos because exploitation of the flaw relies on a script forcing a local machine into authenticating to itself, which it does using NTLM.

The script tricks victim machines into a local NTLM location by forcing it to resolve a DNS record such as localhost1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAwbEAYBAAAAM. The computer strips everything after localhost, meaning that NTLM will treat the authentication as local, “irrespective of the machine’s hostname,” Synacktiv wrote.

Attackers must then coerce the Local Security Authority Subsystem Service on a victim computer – now in possession of a local NTLM authentication token – into supplying the token to an attacker-controlled server.

The CISA mandate applies only to U.S. federal agencies, but the agency advises the quick remediation by everyone of any flaw added to its Known Exploited Vulnerabilities catalog.

With reporting by Information Security Media Group’s David Perera in Northern Virginia.



Source link

Tags: CISAExploitableFlagsFlawHighlySMBWindows
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

UK Hospital Asks Court to Stymie Ransomware Data Leak
Data Breach

UK Hospital Asks Court to Stymie Ransomware Data Leak

December 8, 2025
These five countries recorded the most third-party data breaches last year
Data Breach

These five countries recorded the most third-party data breaches last year

December 8, 2025
LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net
Data Breach

LockBit 5’s “new secure blog domain” infra leaked already – DataBreaches.Net

December 7, 2025
Rethinking the CIO-CISO Dynamic in the Age of AI
Data Breach

Rethinking the CIO-CISO Dynamic in the Age of AI

December 6, 2025
NHS supplier hit with £3m fine for security failings that led to attack
Data Breach

NHS supplier hit with £3m fine for security failings that led to attack

December 6, 2025
HHS Outlines AI Road Map Amid Major Department Overhaul
Data Breach

HHS Outlines AI Road Map Amid Major Department Overhaul

December 5, 2025
Next Post
Top Cybersecurity Certifications for Freshers! 🛡🎓

Top Cybersecurity Certifications for Freshers! 🛡🎓

Call center agent charged under cybercrime law

Call center agent charged under cybercrime law

Recommended Stories

आपका Gmail किसने खोला, ऐसा पता करें | Cyber Crime Investigator Amit Dubey | Whatsapp | SKT Podcast

आपका Gmail किसने खोला, ऐसा पता करें | Cyber Crime Investigator Amit Dubey | Whatsapp | SKT Podcast

December 7, 2025
Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing | by Wojciech Reguła | SecuRing

Vulnerabilities and Threats in Local Authorization on iOS Devices — Securing | by Wojciech Reguła | SecuRing

October 4, 2025
Delhi Blast News: How Attackers Planned Attack Near Red Fort | Cyber Security Podcast W/ Amit Dubey

Delhi Blast News: How Attackers Planned Attack Near Red Fort | Cyber Security Podcast W/ Amit Dubey

December 6, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested