A vulnerability identified as CVE-2025-24071 has been discovered in Windows File Explorer, allowing attackers to extract NTLM hashed passwords with minimal user interaction. This high-severity flaw, termed “NTLM Hash Leak via RAR/ZIP Extraction,” exploits Windows Explorer’s automatic file processing when a specially crafted .library-ms file is extracted from a compressed archive. The file contains a malicious SMB path that triggers an NTLM authentication handshake, leaking the victim’s NTLMv2 hash. Microsoft addressed this issue in its March 2025 updates. A proof-of-concept exploit was published by researcher 0x6rss, and evidence suggests the vulnerability may have been exploited in the wild prior to its disclosure. Users are advised to apply security updates and implement protections against NTLM relay attacks.