vendor:
XRM-MS File Type
by:
John Page (aka hyp3rlinx)
6.1
CVSS
HIGH
NTLM Hash Disclosure (Spoofing)
200
CWE
Product Name: XRM-MS File Type
Affected Version From: Windows 7
Affected Version To: Windows 11
Patch Exists: NO
Related CWE:
CPE: o:microsoft:windows
Platforms Tested: Windows 7, Windows 10, Windows Server 2019
2021
Microsoft Windows xrm-ms File NTLM Hash Disclosure
The Microsoft Windows XRM-MS file type, associated with software licensing, allows adversaries to inject XML stylesheets pointing to LAN network shares or attacker-controlled infrastructure. This leads to outbound connections leaking the target's NTLM hash. The exploit works through LAN network shares or remote drive-by downloads, requiring user interaction to open the file. The xrm-ms file type bypasses some security measures and appears trust-worthy as it defaults to opening in Internet Explorer or Edge on Windows systems.
Mitigation:
Ensure that users exercise caution when opening files, especially those received from untrusted sources. Block xrm-ms files at email gateways and consider disabling the default application association for xrm-ms files.