POC详情: 07bc5b629c7c4072f8318bb3f7f2db80a56dc38e

来源
关联漏洞

疑似Oday

介绍
# CVE-2024-4573-Mitigation-Script

CVE-2024-43451 is a vulnerability in systems that allow NTLM authentication, a legacy protocol that can be exploited for credential relay attacks or brute force attacks. This vulnerability arises when NTLM is enabled, leaving systems susceptible to unauthorized access, potentially disclosing the user's NTLMv2 hash to an attacker with only minimal interaction.

This detection script works as follows:

Registry Path Check: Reads the LmCompatibilityLevel value from the registry path HKLM:\SYSTEM\CurrentControlSet\Control\Lsa.

Configuration Evaluation:

If LmCompatibilityLevel is less than 5, NTLM authentication is enabled, and the system is vulnerable.

If LmCompatibilityLevel is 5 or higher, NTLM authentication is disabled, and the system is protected.

Status Report: Outputs whether NTLM authentication is enabled or disabled based on the registry value.

By detecting whether NTLM authentication is enabled, this script will allow you to quickly assess your system's risk exposure to CVE-2024-43451. 

Kudos to VSociety
文件快照

[4.0K] /data/pocs/07bc5b629c7c4072f8318bb3f7f2db80a56dc38e ├── [2.0K] CVE-2024-43573 Mitigation Script.ps └── [1.0K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。