CVE-2024-45301
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-12

Last updated on: 2025-11-12

Assigner: GitHub, Inc.

Description
Mintty is a terminal emulator for Cygwin, MSYS, and WSL. In versions 2.3.6 through 3.7.4, several escape sequences can cause the mintty process to access a file in a specific path. It is triggered by simply printing them out on bash. An attacker can specify an arbitrary network path, negotiate an ntlm hash out of the victim's machine to an attacker controlled remote host. An attacker can use password cracking tools or NetNTLMv2 hashes to Pass the Hash. Version 3.7.5 fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-12
Last Modified
2025-11-12
Generated
2026-05-07
AI Q&A
2025-11-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
mintty mintty 3.7.4
mintty mintty 3.7.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Mintty (versions 2.3.6 through 3.7.4) involves certain escape sequences that, when printed in bash, cause the mintty process to access a file at a specific path. An attacker can exploit this by specifying an arbitrary network path, which leads to the victim's machine negotiating an NTLM hash with a remote host controlled by the attacker. This allows the attacker to capture authentication hashes.


What immediate steps should I take to mitigate this vulnerability?

Upgrade mintty to version 3.7.5 or later, as this version fixes the vulnerability.


How can this vulnerability impact me? :

The vulnerability can lead to the exposure of NTLM authentication hashes from the victim's machine to an attacker-controlled remote host. The attacker can then use password cracking tools or perform Pass the Hash attacks using the captured NetNTLMv2 hashes, potentially gaining unauthorized access to systems or resources.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart