CVE-2024-45301
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mintty | mintty | 3.7.4 |
| mintty | mintty | 3.7.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Mintty (versions 2.3.6 through 3.7.4) involves certain escape sequences that, when printed in bash, cause the mintty process to access a file at a specific path. An attacker can exploit this by specifying an arbitrary network path, which leads to the victim's machine negotiating an NTLM hash with a remote host controlled by the attacker. This allows the attacker to capture authentication hashes.
What immediate steps should I take to mitigate this vulnerability?
Upgrade mintty to version 3.7.5 or later, as this version fixes the vulnerability.
How can this vulnerability impact me? :
The vulnerability can lead to the exposure of NTLM authentication hashes from the victim's machine to an attacker-controlled remote host. The attacker can then use password cracking tools or perform Pass the Hash attacks using the captured NetNTLMv2 hashes, potentially gaining unauthorized access to systems or resources.