0patch releases yet another free fix for yet another 0day vulnerability in Windows that Microsoft has not addressed

0patch Steps In to Address Critical Windows Vulnerability

In the ever-evolving landscape of cybersecurity, vulnerabilities in Windows operating systems appear with unsettling regularity. While Microsoft is known for its eventual patching of these issues, the timeline can often leave users exposed. Fortunately, 0patch, a company dedicated to providing timely security solutions, has stepped up once again to address a significant concern.

0patch operates on a subscription model, offering support and security fixes for Windows versions that Microsoft has left behind. Additionally, the firm frequently releases complimentary patches for vulnerabilities that remain unaddressed by Microsoft. Their latest offering targets a concerning SCF File NTLM hash disclosure vulnerability, classified as a 0day issue.

This security flaw impacts all versions of Windows from Windows 7 to the latest Windows 11 build, as well as Windows Server editions from 2008 through 2025. According to 0patch, the implications and potential attack scenarios of this vulnerability mirror those of a previously identified 0day related to URL files, which Microsoft has since patched. However, 0patch emphasizes that this new flaw presents its own unique challenges.

In a recent blog post detailing the release of micropatches for the SCF File NTLM hash disclosure vulnerability, 0patch elaborated on their findings:

“While patching a SCF File NTLM hash disclosure issue on our security-adopted Windows versions, our researchers discovered a related vulnerability on all Windows Workstation and Server versions from Windows 7 and Server 2008 R2 to the latest Windows 11 v24H2 and Server 2025. The vulnerability allows an attacker to obtain user’s NTLM credentials by having the user view a malicious file in Windows Explorer—e.g., by opening a shared folder or USB disk containing such a file, or viewing the Downloads folder where such a file was previously automatically downloaded from the attacker’s web page.”

In an effort to mitigate the risk of exploitation, 0patch has opted not to disclose specific details about the vulnerability at this time. This information is likely to be shared once Microsoft releases an official fix, although it is important to note that older Windows versions will not receive any sanctioned patches from Microsoft.

For those interested in obtaining the patches for free and learning more about the vulnerability, additional information is available on 0patch’s website.

Image credit: Andrii Zorii / Dreamstime.com

Winsage
0patch releases yet another free fix for yet another 0day vulnerability in Windows that Microsoft has not addressed