Skip to content

H3-2024-0056

Microsoft SQL Server NTLM Credential Coercion Vulnerability

Category SECURITY_CONTROLS
Base Score 7.1

Description

By design SQL Server permits authenticated users to invoke certain stored procedures (e.g. xp_dirtree, xp_fileexist) that accept UNC paths. This can be abused by attackers to leak the NTLMv2 hash of the Windows service account used to run SQL Server.

Impact

An attacker can invoke these procedures with a UNC path argument pointing back to an attacker-controlled server. An attacker can then capture and potentially crack the NTLMv2 hash of the Windows service account used to run SQL Server, or conduct an NTLM relay attack to access other hosts or services on the network.

References