Recently, there is an massive vulnerability have been found in the Microsoft NTLM which it can result to RDP to the Microsoft NTLM Authentication Protocol,

The vulnerability that been found by Preempt researchers are as follows:

  • Message Integrity Code (MIC) can be exploited by the attackers where they can remove the MIC Protection. As a result, they can modify any field in the NTLM protocol.
  • SMB Session Signing can be exploited by the attacker where they can access as a privileged user to the server to relay the NTLM authentication requests to any server in the domain and network.
  • Enhanced Protection for Authentication can be exploited by the attacker by modifying the NTLM message so that they can generate a legitimate channel of binding information to the server


  1. All system administrator need to do a patch to all workstation and server in order to protect themselves from NTLM vulnerabilities.
  2. All system administrator need to re-configure SMB Signing, LDAP/S Signing and EPA which needs to enforce, advisable to use the latest version of NTLM
  3. All system administrator is advisable to remove NTLM if there are not been used in the server.

Source: Critical Microsoft NTLM vulnerabilities allow remote code execution on any Windows machine

By Wan Ariff

He brings with him working experience in Information Security filed which specializing in Penetration Testing and Digital Forensic. His passion is more to IT Security

Leave a Reply

Your email address will not be published. Required fields are marked *