When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

By listening to a self-controlled path (domain, IP, folder path, UNC, etc.

The bug, tracked as CVE-2023-35636, carries a severity score of 6.5.

A padlock resting on a keyboard.

Hackers could distribute the link in an email and trick the victims into opening it.

That can allegedly be done via Windows Performance Analyzer (WPA) and the Windows File Explorer.

“Usually, NTLM v2 should be used when attempting to authenticate against internal IP-address-based services.

ViaThe Hacker News

More from TechRadar Pro