A critical 0-click remote authentication bypass vulnerability in Microsoft Telnet Server that allows attackers to gain access as any user, including Administrator, without requiring valid credentials. The vulnerability exploits a misconfiguration in the NTLM Authentication processes of the Telnet MS-TNAP extension allowing remote unauthenticated attackers to bypass authentication completely. Summary This repository contains a Proof of Concept (PoC) exploit for a critical authentication bypass vulnerability in Microsoft Telnet Server's implementation of NTLM authentication over MS-TNAP. The vulnerability affects Windows 2000 through Windows Server 2008 R2 and allows complete authentication bypass via manipulation of the mutual authentication process. The exploit works by tricking the server into validating the client as Administrator without supplying valid credentials, leveraging a fundamental flaw in how the Windows Telnet Server mistakenly handles mutual authentication. IMPORTANT: There is currently no patch for this vulnerability. System administrators should disable Telnet services immediately on all Microsoft systems.
Microsoft Telnet Server MS-TNAP Authentication Bypass [RCE 0day]
3 Replies, 119 ViewsMessages In This Thread |
Microsoft Telnet Server MS-TNAP Authentication Bypass [RCE 0day] - by Cmiami - 04-30-2025, 09:44 AM
RE: Microsoft Telnet Server MS-TNAP Authentication Bypass [RCE 0day] - by Bdbdbd - 04-30-2025, 01:18 PM
RE: Microsoft Telnet Server MS-TNAP Authentication Bypass [RCE 0day] - by javion.parin - 05-11-2025, 11:14 AM
RE: Microsoft Telnet Server MS-TNAP Authentication Bypass [RCE 0day] - by Asiersinmas - 05-13-2025, 08:55 PM
|
Users browsing this thread: 3 Guest(s)