Discover the security vulnerability in Ignite Realtime Spark 2.8.3 on Windows. Learn how an attacker can exploit this issue to collect (NT)LM hashes and potentially compromise computers. Find mitigation steps here.
An issue was discovered in Ignite Realtime Spark 2.8.3 (and the ROAR plugin for it) on Windows where a chat message can lead to the leakage of (NT)LM hashes, potentially compromising the user's computer.
Understanding CVE-2020-12772
This CVE highlights a security vulnerability in Ignite Realtime Spark 2.8.3 and the associated ROAR plugin on Windows.
What is CVE-2020-12772?
The vulnerability allows an attacker to collect (NT)LM hashes by sending them with an HTTP request when a chat message includes an IMG element with a SRC attribute pointing to an external host's IP address.
The Impact of CVE-2020-12772
Exploitation of this vulnerability could lead to the compromise of user credentials, enabling unauthorized access to the affected computer.
Technical Details of CVE-2020-12772
This section provides more in-depth technical insights into the CVE.
Vulnerability Description
The vulnerability in Ignite Realtime Spark 2.8.3 and the ROAR plugin allows for the unauthorized collection of (NT)LM hashes through crafted chat messages.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from CVE-2020-12772 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices