CVE-2025-24054
MEDIUM KEVWindows NTLM - Path Traversal
Title source: llmDescription
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
Exploits (16)
github
WORKING POC
52 stars
by rubenformation · powershellinfoleak
https://github.com/rubenformation/CVE-2025-50154
github
WORKING POC
25 stars
by Marcejr117 · pythonpoc
https://github.com/Marcejr117/CVE-2025-24071_PoC
nomisec
WORKING POC
21 stars
by helidem · client-side
https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC
nomisec
WORKING POC
2 stars
by Untouchable17 · remote-auth
https://github.com/Untouchable17/CVE-2025-24054
nomisec
WORKING POC
1 stars
by Yuri08loveElaina · client-side
https://github.com/Yuri08loveElaina/CVE-2025-24054_POC
nomisec
WORKING POC
by SecurityLayer404 · local
https://github.com/SecurityLayer404/CVE-2025-24054-24071---Metasploit-Module
patchapalooza
by WhiteDominion · client-side
https://github.com/WhiteDominion/CVE-2025-24054_CVE-2025-24071-PoC
References (7)
Scores
CVSS v3
6.5
EPSS
0.0783
EPSS Percentile
92.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Details
CISA KEV
2025-04-17
VulnCheck KEV
2025-04-16
ENISA EUVD
EUVD-2025-6336
CWE
CWE-73
Status
published
Products (16)
microsoft/windows_10_1507
< 10.0.10240.20947 (2 CPE variants)
microsoft/windows_10_1607
< 10.0.14393.7876 (2 CPE variants)
microsoft/windows_10_1809
< 10.0.17763.7009 (2 CPE variants)
microsoft/windows_10_21h2
< 10.0.19044.5608 (3 CPE variants)
microsoft/windows_10_22h2
< 10.0.19045.5608 (3 CPE variants)
microsoft/windows_11_22h2
< 10.0.22621.5039 (2 CPE variants)
microsoft/windows_11_23h2
< 10.0.22631.5039 (2 CPE variants)
microsoft/windows_11_24h2
< 10.0.26100.3403 (2 CPE variants)
microsoft/windows_server_2008
r2 sp1
microsoft/windows_server_2012
... and 6 more
Published
Mar 11, 2025
KEV Added
Apr 17, 2025
Tracked Since
Feb 18, 2026