{"id":7998,"date":"2025-10-24T10:28:38","date_gmt":"2025-10-24T10:28:38","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=7998"},"modified":"2025-10-24T10:28:38","modified_gmt":"2025-10-24T10:28:38","slug":"microsoft-disables-downloaded-file-previews-to-block-ntlm-hash-leaks","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=7998","title":{"rendered":"Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>Microsoft this week introduced that the preview function is now disabled in Home windows\u2019s File Explorer for information downloaded from the web, as an extra safety in opposition to NTLM hash leaks.<\/strong><\/p>\n<p>The change, rolled out as a part of the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/microsoft-patches-173-vulnerabilities-including-exploited-windows-flaws\/\">October 2025 Patch Tuesday<\/a> safety updates, applies to all information which might be marked with Mark of the Net (MotW).<\/p>\n<p>Home windows provides the MotW to information fetched through browser downloads or electronic mail attachments and warns customers of the potential threat these information pose. For Workplace information, the system blocks macros, which may include malicious code.<\/p>\n<p>By disabling the preview of information downloaded from the web, Microsoft seeks to forestall a safety defect resulting in NTLM hash leaks when a probably unsafe file is previewed. Attackers can brute-force the leaked hash to retrieve a person\u2019s password, or may mount relay assaults.<\/p>\n<p>\u201cThis variation mitigates a vulnerability the place NTLM hash leakage may happen if customers preview information containing HTML tags (reminiscent of <link\/>, <src>, and so forth) referencing exterior paths. Attackers may exploit this preview function to seize delicate credentials,\u201d Microsoft <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/support.microsoft.com\/en-us\/topic\/file-explorer-automatically-disables-the-preview-feature-for-files-downloaded-from-the-internet-56d55920-6187-4aae-a4f6-102454ef61fb\">explains<\/a>.<\/p>\n<p>The corporate doesn&#8217;t say which flaw it tackles, however it seems that it might be CVE-2025-59214, which is described as a File Explorer spoofing difficulty and will enable attackers to leak delicate info over the community.<\/p>\n<p>The bug is a bypass for CVE-2025-50154, which in flip is a bypass for CVE-2025-24054, a zero-click NTLM credential leakage vulnerability that Microsoft <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/patch-tuesday-microsoft-patches-57-flaws-flags-six-active-zero-days\/\">tried to resolve in March<\/a>. CVE-2025-24054 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/fresh-windows-ntlm-vulnerability-exploited-in-attacks\/\">has been exploited within the wild<\/a>, together with in opposition to authorities and personal establishments in Poland and Romania.<\/p>\n<p>The unique bug might be triggered through malicious .library-ms information positioned inside a ZIP archive. When the person extracted the archive, Home windows initiated an SMB authentication request to a distant server, leaking the NTLM hash.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Commercial. Scroll to proceed studying.<\/span><\/div>\n<p>Microsoft warned in March that merely choosing the malicious file or right-clicking it may set off the vulnerability.<\/p>\n<p>Whereas analyzing the problem, Cymulate found the patch might be bypassed, and Microsoft in August rolled out a contemporary spherical of fixes, assigning CVE-2025-50154 to the problem and saying that it existed due to a niche left by the unique patch.<\/p>\n<p>Shortly after, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cymulate.com\/blog\/ntlm-leak-cve-2025-59214\/\">Cymulate discovered<\/a> that these patches might be bypassed as effectively, and reported the weak spot to Microsoft, which assigned CVE-2025-59214 to it.<\/p>\n<p>Now, Microsoft says that disabling File Explorer\u2019s preview function for information downloaded from the web ought to forestall the leak of NTLM hashes.<\/p>\n<p>Following the October safety patches, the File Explorer preview pane will warn customers that the file they&#8217;re making an attempt to preview might be dangerous and that they need to solely open it in the event that they belief its origin. The identical applies to information considered on an Web Zone file share.<\/p>\n<p>To take away the block, customers have to right-click on the downloaded file, choose Properties, after which Unblock. Based on Microsoft, the change could not take impact till the following login.<\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/highest-ever-severity-score-assigned-by-microsoft-to-asp-net-core-vulnerability\/\">\u2018Highest Ever\u2019 Severity Rating Assigned by Microsoft to ASP.NET Core Vulnerability<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/patch-bypassed-for-supermicro-vulnerability-allowing-bmc-hack\/\">Patch Bypassed for Supermicro Vulnerability Permitting BMC Hack<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/critical-vulnerabilities-patched-in-tp-links-omada-gateways\/\">Essential Vulnerabilities Patched in TP-Hyperlink\u2019s Omada Gateways<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/ics-patch-tuesday-fixes-announced-by-siemens-schneider-rockwell-abb-phoenix-contact\/\">ICS Patch Tuesday: Fixes Introduced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact<\/a>\n\t\t\t<\/p>\n<p><\/src><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Microsoft this week introduced that the preview function is now disabled in Home windows\u2019s File Explorer for information downloaded from the web, as an extra safety in opposition to NTLM hash leaks. The change, rolled out as a part of the October 2025 Patch Tuesday safety updates, applies to all information which might be marked [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8000,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1140,6064,6065,2849,6068,2002,618,6067,6066],"class_list":["post-7998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-block","tag-disables","tag-downloaded","tag-file","tag-hash","tag-leaks","tag-microsoft","tag-ntlm","tag-previews"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7998"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7998\/revisions"}],"predecessor-version":[{"id":7999,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7998\/revisions\/7999"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/8000"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-09 04:04:06 UTC -->