Researchers at Acros Security have unveiled a concerning zero-day vulnerability affecting all versions of Windows from 7 through 11, as well as Windows Server 2008 R2 and later. This credential-stealer poses a significant risk, as it currently lacks an official patch from Microsoft. The details surrounding this exploit are being closely guarded to prevent further exploitation until a remedy is in place.
The Windows Zero-Day Exploit With No Official Fix—What We Know So Far
This vulnerability targets the Windows NT LAN Manager, a critical suite of security protocols that ensure user authentication, integrity, and confidentiality. Mitja Kolsek, founder of Acros Security and operator of the 0patch vulnerability patch management platform, explained the severity of the situation. “The vulnerability allows an attacker to obtain a user’s NTLM credentials by simply having the user view a malicious file in Windows Explorer,” he noted. This means that merely opening a shared folder or USB drive containing the harmful file, or even glancing at the downloads folder where the file was automatically saved from an attacker’s webpage, can lead to exploitation.
How To Protect Your Version Of Windows
In the absence of an official fix from Microsoft, users are encouraged to take proactive measures to safeguard their systems. The 0patch platform has released a free “micropatch” that can be utilized by Windows users, including those operating versions that are no longer officially supported. This interim solution provides a layer of protection until Microsoft rolls out an official patch. As this situation continues to evolve, efforts to obtain a statement from Microsoft are underway.