Microsoft discloses unpatched Office flaw that exposes NTLM hashes

Share:

Update with further information from Microsoft.

Microsoft has disclosed a high-severity vulnerability affecting Office 2016 that could expose NTLM hashes to a remote attacker.

Tracked as CVE-2024-38200, this security flaw is caused by an information disclosure weakness that enables unauthorized actors to access protected information.

It impacts multiple 32-bit and 64-bit Office versions, including Office 2016, Office 2019, Office LTSC 2021, and Microsoft 365 Apps for Enterprise.

Even though Microsoft’s exploitability assessment says that exploitation of CVE-2024-38200 is less likely, MITRE has tagged the likelihood of exploitation for this type of weakness as highly probable.

“In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability,” Microosoft’s advisory explains.

“However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.”

The company is developing security updates to address this bug but has yet to announce a release date.

Since publishing this article, Microsoft shared further information about the CVE-2024-38200 flaw in the advisory, stating that they released a fix through Feature Flighting on 7/30/2024

“No, we identified an alternative fix to this issue that we enabled via Feature Flighting on 7/30/2024,” reads the updated CVE-2024-38200 advisory.

“Customers are already protected on all in-support versions of Microsoft Office and Microsoft 365. Customers should still update to the August 13, 2024 updates for the final version of the fix.”

The advisory further states that this flaw can be mitigated by blocking outbound NTLM traffic to remote servers.

Microsoft says you can block outbound NTLM traffic using the following three methods:

  • Configuring the Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers group policy to allow, block, or audit outgoing NTLM traffic from a computer running Windows 7, Windows Server 2008, or later to any remote server running the Windows operating system. In this case, you would want to use the policy to block NTLM traffic.
  • Adding users to the Protected Users Security Group, which restricts the use of NTLM as an authentication mechanism
  • Blocking all outbound traffic to TCP port 445.

Microsoft notes utilizing any of these mitigations could prevent legitimate access to remote servers that rely on NTLM authentication.

While Microsoft did not share any further details about the vulnerability, this guidance indicates the flaw can be used to force an outbound NTLM connection, such as to an SMB share on an attacker’s server.

When this happens, Windows sends the user’s NTLM hashes, including their hashed password, which the attacker can then steal.

As demonstrated repeatedly in the past, these hashes can be cracked, allowing threat actors to gain access to login names and plaintext passwords.

NTLM hashes can also be used in NTLM Relay Attacks, as previously seen with the ShadowCoerce, DFSCoerce, PetitPotam, and RemotePotato0 attacks, to gain access to other resources on a network.

More details to be shared at Defcon

Microsoft attributed the discovery of the flaws to PrivSec Consulting security consultant Jim Rush and Synack Red Team member Metin Yunus Kandemir.

PrivSec’s Managing Director Peter Jakowetz told BleepingComputer that Rush will disclose more information about this vulnerability in his upcoming “NTLM – The last ride” Defcon talk.

“There will be a deep dive on several new bugs we disclosed to Microsoft (including bypassing a fix to an existing CVE), some interesting and useful techniques, combining techniques from multiple bug classes resulting in some unexpected discoveries and some absolutely cooked bugs,” Rush explains.

“We’ll also uncover some defaults that simply shouldn’t exist in sensible libraries or applications as well as some glaring gaps in some of the Microsoft NTLM related security controls.”

Microsoft is also working on patching zero-day flaws that could be exploited to “unpatch” up-to-date Windows systems and reintroduce old vulnerabilities.

The company also said earlier this week that it’s considering patching a Windows Smart App Control, SmartScreen bypass exploited since 2018.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:25 pm, Jun 21, 2025
weather icon 26°C
L: 24° | H: 27°
scattered clouds
Humidity: 52 %
Pressure: 1013 mb
Wind: 11 mph ESE
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 44%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 10:00 pm
weather icon
24° | 27°°C 0.25 mm 25% 16 mph 64 % 1014 mb 0 mm/h
Mon Jun 23 10:00 pm
weather icon
15° | 23°°C 0.2 mm 20% 15 mph 80 % 1016 mb 0 mm/h
Tue Jun 24 10:00 pm
weather icon
13° | 25°°C 0 mm 0% 14 mph 80 % 1016 mb 0 mm/h
Wed Jun 25 10:00 pm
weather icon
16° | 28°°C 0.21 mm 21% 10 mph 85 % 1014 mb 0 mm/h
Thu Jun 26 10:00 pm
weather icon
16° | 20°°C 1 mm 100% 12 mph 95 % 1015 mb 0 mm/h
Tomorrow 1:00 am
weather icon
21° | 24°°C 0.2 mm 20% 8 mph 54 % 1013 mb 0 mm/h
Tomorrow 4:00 am
weather icon
17° | 20°°C 0.25 mm 25% 9 mph 64 % 1013 mb 0 mm/h
Tomorrow 7:00 am
weather icon
17° | 17°°C 0 mm 0% 10 mph 64 % 1014 mb 0 mm/h
Tomorrow 10:00 am
weather icon
22° | 22°°C 0 mm 0% 12 mph 49 % 1014 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
26° | 26°°C 0 mm 0% 14 mph 34 % 1013 mb 0 mm/h
Tomorrow 4:00 pm
weather icon
24° | 24°°C 0 mm 0% 16 mph 41 % 1012 mb 0 mm/h
Tomorrow 7:00 pm
weather icon
23° | 23°°C 0 mm 0% 14 mph 51 % 1012 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
19° | 19°°C 0 mm 0% 10 mph 59 % 1013 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€88,968.76
-0.96%
Ethereum(ETH)
€2,078.80
-1.01%
Tether(USDT)
€0.87
0.01%
XRP(XRP)
€1.80
-2.21%
Solana(SOL)
€119.67
-1.96%
USDC(USDC)
€0.87
0.00%
Dogecoin(DOGE)
€0.137126
-3.10%
Shiba Inu(SHIB)
€0.000010
-3.39%
Pepe(PEPE)
€0.000009
-2.62%
Peanut the Squirrel(PNUT)
€0.218233
13.10%
Scroll to Top