Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2025-24071

Description

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.

POC

Reference

- https://www.vicarius.io/vsociety/posts/cve-2025-24071-spoofing-vulnerability-in-microsoft-windows-file-explorer-detection-scrip

- https://www.vicarius.io/vsociety/posts/cve-2025-24071-spoofing-vulnerability-in-microsoft-windows-file-explorer-mitigation-script

Github

- https://github.com/0x6rss/CVE-2025-24071_PoC

- https://github.com/0xMarcio/cve

- https://github.com/0xVoodoo/PoCs

- https://github.com/0xsyr0/OSCP

- https://github.com/AC8999/CVE-2025-24071

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/Andromeda254/cve

- https://github.com/B1ack4sh/Blackash-CVE-2025-24071

- https://github.com/Cesar-http/Windows-Explorer-CVE-2025-24071

- https://github.com/DeshanFer94/CVE-2025-24071-POC-NTLMHashDisclosure-

- https://github.com/FOLKS-iwd/CVE-2025-24071-msfvenom

- https://github.com/GhostTroops/TOP

- https://github.com/J1ezds/Vulnerability-Wiki-page

- https://github.com/LOOKY243/CVE-2025-24071-PoC

- https://github.com/Marcejr117/CVE-2025-24071_PoC

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Royall-Researchers/CVE-2025-24071

- https://github.com/Shadrack2023/Shadrack2023

- https://github.com/TH-SecForge/CVE-2025-24071

- https://github.com/ThemeHackers/CVE-2025-24071

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Uriel-SG/HTB-Fluffy

- https://github.com/VishuGahlyan/OSCP

- https://github.com/afkfr0mkeyb0ard/CustomKaliSetup

- https://github.com/aleongx/CVE-2025-24071

- https://github.com/basekilll/CVE-2025-24054_PoC

- https://github.com/cesarbtakeda/Windows-Explorer-CVE-2025-24071

- https://github.com/ctabango/CVE-2025-24071_PoCExtra

- https://github.com/ex-cal1bur/SMB_CVE-2025-24071

- https://github.com/f4dee-backup/CVE-2025-24071

- https://github.com/fcoomans/HTB-machines

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/grisuno/LazyOwn

- https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC

- https://github.com/jitmondal1/OSCP

- https://github.com/meloppeitreet/Personal-YARA-Collection-by-meloppeitreet

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/pswalia2u/CVE-2025-24071_POC

- https://github.com/rubbxalc/CVE-2025-24071

- https://github.com/shacojx/CVE-2025-24071-Exploit

- https://github.com/tanjiti/sec_profile

- https://github.com/xigney/CVE-2025-24054_PoC

- https://github.com/yum1ra/CVE-2025-24054_CVE-2025-24071-PoC