Microsoft SharePoint 2019 - NTLM Authentication
Microsoft SharePoint 2019 - NTLM Authentication
AI Analysis
Technical Summary
The reported security threat concerns Microsoft SharePoint 2019 with a focus on its NTLM (NT LAN Manager) authentication mechanism. NTLM is a legacy authentication protocol used in Windows environments for network authentication. While SharePoint 2019 supports modern authentication methods, NTLM may still be enabled for backward compatibility or specific configurations. The exploit targets weaknesses in the NTLM authentication process, potentially allowing an attacker to bypass authentication controls or perform relay attacks. Such attacks can lead to unauthorized access to SharePoint resources, data leakage, or privilege escalation within the affected environment. The presence of exploit code (not detailed here) indicates that the vulnerability can be actively exploited, although no known exploits in the wild have been reported yet. The lack of specific affected versions and patch information suggests that this is a newly disclosed or less documented issue, requiring organizations to review their SharePoint 2019 configurations and NTLM usage carefully. Given the medium severity rating and remote exploitability, the threat likely involves network-based attacks without requiring local access or user interaction, but may depend on the presence of NTLM authentication enabled in the environment.
Potential Impact
For European organizations, the exploitation of NTLM authentication weaknesses in SharePoint 2019 can have significant consequences. SharePoint is widely used across Europe in both public and private sectors for collaboration, document management, and intranet services. Unauthorized access through NTLM exploitation could lead to exposure of sensitive corporate or governmental data, disruption of business processes, and potential compliance violations under regulations such as GDPR. The medium severity suggests that while the threat is serious, it may not lead to immediate full system compromise but could serve as a foothold for further lateral movement or privilege escalation within networks. Organizations relying heavily on SharePoint 2019 with NTLM enabled are at increased risk, especially if other mitigations like network segmentation or multi-factor authentication are not in place.
Mitigation Recommendations
European organizations should take specific steps beyond generic advice to mitigate this threat: 1) Audit SharePoint 2019 environments to identify if NTLM authentication is enabled and assess the necessity of its use. 2) Where possible, disable NTLM authentication in favor of more secure protocols such as Kerberos or modern OAuth-based authentication. 3) Apply the latest Microsoft security updates and patches for SharePoint 2019, even if no direct patch is listed, as cumulative updates may address related issues. 4) Implement network-level protections such as SMB signing and enforce strict firewall rules to limit exposure of SharePoint servers to untrusted networks. 5) Monitor authentication logs for unusual NTLM authentication attempts or relay attack patterns. 6) Employ multi-factor authentication (MFA) for SharePoint access to reduce the risk of credential misuse. 7) Educate IT staff on the risks associated with legacy authentication protocols and encourage migration planning to more secure authentication methods.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
Indicators of Compromise
- exploit-code: # Titles: Microsoft SharePoint 2019 NTLM Authentication # Author: nu11secur1ty # Date: 06/27/25 # Vendor: Microsoft # Software: https://www.microsoft.com/en-us/download/details.aspx?id=57462 # Reference: https://www.networkdatapedia.com/post/ntlm-autSharePoint 2019 NTLM Authentication hentication-security-risks-and-how-to-avoid-them-gilad-david-maayan ## Description: Microsoft SharePoint Central Administration improperly exposes NTLM-authenticated endpoints to low-privileged or even brute-forced domain accounts. Once authenticated, an attacker can access the `_api/web` endpoint, disclosing rich metadata about the SharePoint site, including user group relationships, workflow configurations, and file system structures. The vulnerability enables username and password enumeration, internal structure mapping, and API abuse. Key issues include: - NTLM over HTTP (unencrypted) - No fine-grained access control on `_api/web` - NTLM error codes act as oracles for credential validation STATUS: HIGH-CRITICAL Vulnerability [+]Exploit: ``` # NTLM Authentication + SharePoint Enumeration Tool Usage: python ntml.py -u http://10.10.0.15:10626 -U 'CORP\spfarm' -P 'p@ssw0rd' -v # Success output (highlight): [+] NTLM Authentication succeeded on http://10.10.0.15:10626/_api/web # Result: Full SharePoint metadata dump from the Central Admin instance ``` # Reproduce: [href]( https://github.com/nu11secur1ty/CVE-mitre/tree/main/2025/CVE-2025-47166/PoC) # Time spent: 72:15:00 -- System Administrator - Infrastructure Engineer Penetration Testing Engineer Exploit developer at https://packetstormsecurity.com/ https://cve.mitre.org/index.html https://cxsecurity.com/ and https://www.exploit-db.com/ 0day Exploit DataBase https://0day.today/ home page: https://www.nu11secur1ty.com/ hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E= nu11secur1ty <http://nu11secur1ty.com/>
Microsoft SharePoint 2019 - NTLM Authentication
Description
Microsoft SharePoint 2019 - NTLM Authentication
AI-Powered Analysis
Technical Analysis
The reported security threat concerns Microsoft SharePoint 2019 with a focus on its NTLM (NT LAN Manager) authentication mechanism. NTLM is a legacy authentication protocol used in Windows environments for network authentication. While SharePoint 2019 supports modern authentication methods, NTLM may still be enabled for backward compatibility or specific configurations. The exploit targets weaknesses in the NTLM authentication process, potentially allowing an attacker to bypass authentication controls or perform relay attacks. Such attacks can lead to unauthorized access to SharePoint resources, data leakage, or privilege escalation within the affected environment. The presence of exploit code (not detailed here) indicates that the vulnerability can be actively exploited, although no known exploits in the wild have been reported yet. The lack of specific affected versions and patch information suggests that this is a newly disclosed or less documented issue, requiring organizations to review their SharePoint 2019 configurations and NTLM usage carefully. Given the medium severity rating and remote exploitability, the threat likely involves network-based attacks without requiring local access or user interaction, but may depend on the presence of NTLM authentication enabled in the environment.
Potential Impact
For European organizations, the exploitation of NTLM authentication weaknesses in SharePoint 2019 can have significant consequences. SharePoint is widely used across Europe in both public and private sectors for collaboration, document management, and intranet services. Unauthorized access through NTLM exploitation could lead to exposure of sensitive corporate or governmental data, disruption of business processes, and potential compliance violations under regulations such as GDPR. The medium severity suggests that while the threat is serious, it may not lead to immediate full system compromise but could serve as a foothold for further lateral movement or privilege escalation within networks. Organizations relying heavily on SharePoint 2019 with NTLM enabled are at increased risk, especially if other mitigations like network segmentation or multi-factor authentication are not in place.
Mitigation Recommendations
European organizations should take specific steps beyond generic advice to mitigate this threat: 1) Audit SharePoint 2019 environments to identify if NTLM authentication is enabled and assess the necessity of its use. 2) Where possible, disable NTLM authentication in favor of more secure protocols such as Kerberos or modern OAuth-based authentication. 3) Apply the latest Microsoft security updates and patches for SharePoint 2019, even if no direct patch is listed, as cumulative updates may address related issues. 4) Implement network-level protections such as SMB signing and enforce strict firewall rules to limit exposure of SharePoint servers to untrusted networks. 5) Monitor authentication logs for unusual NTLM authentication attempts or relay attack patterns. 6) Employ multi-factor authentication (MFA) for SharePoint access to reduce the risk of credential misuse. 7) Educate IT staff on the risks associated with legacy authentication protocols and encourage migration planning to more secure authentication methods.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Edb Id
- 52349
- Has Exploit Code
- true
- Code Language
- text
Indicators of Compromise
Exploit Source Code
Exploit code for Microsoft SharePoint 2019 - NTLM Authentication
# Titles: Microsoft SharePoint 2019 NTLM Authentication # Author: nu11secur1ty # Date: 06/27/25 # Vendor: Microsoft # Software: https://www.microsoft.com/en-us/download/details.aspx?id=57462 # Reference: https://www.networkdatapedia.com/post/ntlm-autSharePoint 2019 NTLM Authentication hentication-security-risks-and-how-to-avoid-them-gilad-david-maayan ## Description: Microsoft SharePoint Central Administration improperly exposes NTLM-authenticated endpoints to low-privileged or even brute-force
... (1422 more characters)
Threat ID: 68653a7e6f40f0eb7292ddfc
Added to database: 7/2/2025, 1:56:14 PM
Last enriched: 7/16/2025, 9:22:41 PM
Last updated: 8/15/2025, 8:34:29 AM
Views: 44
Related Threats
Top Israeli Cybersecurity Director Arrested in US Child Exploitation Sting
HighEncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw
MediumU.S. CISA adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog - Security Affairs
MediumU.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog
MediumCisco ISE 3.0 - Remote Code Execution (RCE)
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.