Windows NTLM Credential Leak via File Download Interaction
CVE-2025-24054 is a medium-severity (CVSS 6.5 per Microsoft, 5.4 per NIST) Windows NTLM spoofing vulnerability caused by external control of file name or path (CWE-73). An attacker can leak NTLMv2 credentials by inducing a victim to download and interact with (or simply unzip) a malicious archive containing a specially crafted .library-ms, .searchConnector-ms, or similar Windows shell integration file. The interaction triggers an automatic NTLM authentication to an attacker-controlled server. CISA added this to the KEV catalog with a due date of May 8, 2025, and public exploits are available on Exploit-DB. This is closely related to CVE-2024-43451 but triggers through different file types (library files, search connectors) rather than .url shortcuts.
// CVE-2025-24054 — Windows NTLM Credential Leak via Shell Integration Files
// Detect NTLM coercion via .library-ms, .searchConnector-ms, and similar files
// Key signals: shell processes initiating outbound SMB/WebDAV auth,
// creation of Windows shell integration file types in user dirs
let SuspiciousShellFileCreation =
DeviceFileEvents
| where TimeGenerated > ago(24h)
| where FileName endswith_cs ".library-ms"
or FileName endswith_cs ".searchConnector-ms"
or FileName endswith_cs ".search-ms"
or FileName endswith_cs ".mapimail"
| where ActionType in ("FileCreated", "FileRenamed")
| where FolderPath has_any ("Downloads", "Temp", "AppData", "Desktop")
| extend ThreatIndicator = "CVE-2025-24054-ShellFile-Drop";
let NTLMCoercionFromShell =
DeviceNetworkEvents
| where TimeGenerated > ago(24h)
| where InitiatingProcessFileName in~ ("explorer.exe", "searchprotocolhost.exe",
"searchindexer.exe", "svchost.exe")
| where RemotePort in (445, 139, 80, 443)
| where RemoteIPType == "Public"
| where InitiatingProcessCommandLine has_any ("SearchProtocolHost", "search")
or InitiatingProcessFileName in~ ("searchprotocolhost.exe", "explorer.exe")
| extend ThreatIndicator = "CVE-2025-24054-NTLM-Coercion";
SuspiciousShellFileCreation
| union NTLMCoercionFromShell
| sort by TimeGenerated desc Data Sources
Required Tables
False Positives
- Legitimate .library-ms files deployed by enterprise software (document management, SharePoint connectors)
- Windows Search indexer accessing legitimate UNC paths on corporate file servers (exclude RFC1918 IPs)
- IT tools creating library or search connector files for deployment
Unlock Pro Content
Get the full detection package for CVE-2025-24054 including response playbook, investigation guide, and atomic red team tests.