Windows SPNEGO Extended Negotiation RCE
漏洞信息
漏洞名称: Windows SPNEGO Extended Negotiation RCE
漏洞编号:
- CVE: CVE-2025-47981
漏洞类型: 缓冲区溢出
漏洞等级: 严重
漏洞描述: 该漏洞影响Windows操作系统的SPNEGO扩展协商安全机制,具体表现为在SPNEGO扩展协商处理过程中存在堆缓冲区溢出漏洞(ntoskrnl!SpnegoHandleExtended)。攻击者可以通过发送多个超大的SPNEGO_TOKEN结构来碎片化堆,然后利用精心构造的MechTypeList元素触发溢出,覆盖SECURITY_CONTEXT函数指针,最终通过ROP链部署shellcode实现远程代码执行。受影响的版本包括Windows 11和Windows Server的多个版本,以及Windows 10的多个版本。此漏洞的利用可以通过SMB over TCP(端口445)、HTTP/S(端口80/443,使用Negotiate认证)和Kerberos(端口88)等服务进行。由于漏洞允许远程代码执行,且无需用户交互即可被利用,因此被评级为严重级别。攻击者可以利用此漏洞完全控制受影响的系统,执行任意代码,导致数据泄露、服务中断等严重后果。
产品厂商: Microsoft
产品名称: Windows
影响版本: Windows 11 Version 24H2, Windows Server 2025, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 Version 23H2, Windows 11 version 22H3, Windows 11 version 22H2, Windows Server 2022, Windows 10 Version 22H2, Windows 10 Version 21H2, Windows 10 Version 1809, Windows Server 2019, Windows 10 Version 1607, Windows Server 2016, Windows 10 Version 1507
来源: https://github.com/detectrespondrepeat/CVE-2025-47981
类型: CVE-2025:github search
仓库文件
- README.md
来源概述
CVE-2025-47981 Windows SPNEGO Extended Negotiation RCE
Affected Component:
SPNEGO Extended Negotiation Security Mechanism
🧠 Technical Details
Vulnerability: Heap-based buffer overflow during SPNEGO extended negotiation handling (ntoskrnl!SpnegoHandleExtended
).
- Send multiple oversized
SPNEGO_TOKEN
structures to fragment heap - Trigger overflow with crafted
MechTypeList
element - Overwrite
SECURITY_CONTEXT
function pointer - Redirect execution to ROP chain deploying shellcode
📌 Network Exposure Indicators
Critical Services:
Port | Service |
---|---|
445 | SMB over TCP |
80/443 | HTTP/S (Negotiate auth) |
88 | Kerberos |
Vulnerable Versions:
Product |
---|
Windows 11 Version 24H2 |
Windows Server 2025 |
Windows Server 2022, 23H2 Edition (Server Core installation) |
Windows 11 Version 23H2 |
Windows 11 version 22H3 |
Windows 11 version 22H2 |
Windows Server 2022 |
Windows 10 Version 22H2 |
Windows 10 Version 21H2 |
Windows 10 Version 1809 |
Windows Server 2019 |
Windows 10 Version 1607 |
Windows Server 2016 |
Windows 10 Version 1507 |
🔧 Usage
1 |
|
Options:
Flag | Description |
---|---|
-t |
Target IP address |
-p |
Service port (default: 445/SMB) |
-c |
Command to execute |
--proto |
Protocol: smb (default), http , ldap |
📜 Disclaimer
This PoC is for authorized security research only. Use violates Microsoft’s terms and applicable laws. The author assumes no liability for misuse.