Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Security flaw in OPA Styra exposes NTLM hashes to remote attackers
Global Security

Security flaw in OPA Styra exposes NTLM hashes to remote attackers

AdminBy AdminOctober 22, 2024No Comments3 Mins Read
NTLM Hashes to Remote Attackers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 22, 2024Ravi LakshmananSoftware Vulnerability / Security

NTLM hashes for remote attackers

Details of a fixed security flaw in Styra’s Open Policy Agent have surfaced (OPA), which, if successfully exploited, could lead to a leak of New Technology LAN Manager (NTLM) hashes.

“The vulnerability could allow an attacker to pass the NTLM credentials of a local OPA server user account to a remote server, potentially allowing an attacker to relay authentication or crack a password,” cybersecurity firm Tenable wrote. said in a report shared with The Hacker News.

The security flaw described as Server Message Block (SMB) Forced Authentication Vulnerability and tracked as CVE-2024-8260 (CVSS score: 6.1/7.3), affects both the CLI and the Go Software Development Kit (SDK) for Windows.

Cyber ​​security

Basically, the question stems from invalid input validation which could lead to unauthorized access via leaking the Net-NTLMv2 hash of a user currently logged on to the Windows device running the OPA program.

However, for this to work, the victim must be able to initiate outbound Server Message Block (SMB) traffic over port 445. Some of the other prerequisites that contribute to Medium Severity are listed below –

  • Initial support in the environment or user social engineering that paves the way for OPA CLI execution
  • Passing a Universal Naming Convention (UNC) path instead of a Rego rules file as an argument to OPA CLI or OPA Go library functions

Credentials obtained in this way can be used to perform a relay attack to bypass authentication or hack offline to obtain a password.

“When a user or program tries to access a remote share in Windows, it forces the local machine to authenticate to the remote server via NTLM,” said Tenable security researcher Shelly Raban.

“During this process, the NTLM hash of the local user is sent to the remote server. An attacker could use this mechanism to capture credentials, allowing them to relay authentication or crack hashes offline.”

After a responsible disclosure on June 19, 2024, the vulnerability was fixed in the version 0.68.0 released on August 29, 2024.

“As open source projects are integrated into widespread solutions, it is critical to ensure that they are secure and do not expose vendors and their customers to an enhanced attack surface,” the company said. “Additionally, organizations should minimize access to public services unless absolutely necessary to protect their systems.”

The disclosure comes as Akamai shed light on a privilege escalation flaw in Microsoft’s Remote Registry Service (CVE-2024-43532CVSS score: 8.8), which could allow an attacker to gain SYSTEM privileges via an NTLM relay. It was patched by the tech giant earlier this month following a February 1, 2024 announcement.

Cyber ​​security

“The vulnerability abuses a fallback mechanism in the WinReg client implementation (RPC) that unreliably uses outdated transport protocols when SMB transport is unavailable,” said Akamai researcher Steve Kupczyk said.

“Using this vulnerability, an attacker could pass NTLM client authentication credentials to Active Directory Certificate Services (ADCS) and request a user certificate for further authentication to a domain.”

NTLM’s susceptibility to relay attacks has not gone unnoticed by Microsoft, which earlier this May repeated plans to abandon NTLM in Windows 11 in favor of Kerberos as part of efforts to strengthen user authentication.

“While most RPC servers and clients are secure these days, remnants of an insecure implementation can occasionally be found to varying degrees,” Kupczyk said. “In this case, we were able to achieve NTLM relaying, which is a class of attack best left in the past.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025

Cisco Patches Cve-2025-20188 (10.0 CVSS) in iOS XE, which allows root feat via JWT

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.