Known Exploited Vulnerabilities Spoofing Vulnerability Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2024-38112 Microsoft Windows MSHTML Platform Spoofing Vulnerability exploitation_technique T1189 Drive-by Compromise
Comments
This vulnerability is exploited through a victim visiting a malicious Web page or to clicking on an unsafe link. After visiting the website or clicking on the link, an adversary would gain the ability to execute arbitrary code on the victim system.
References
CVE-2024-38112 Microsoft Windows MSHTML Platform Spoofing Vulnerability exploitation_technique T1204.001 Malicious Link
Comments
This vulnerability is exploited through a victim visiting a malicious Web page or to clicking on an unsafe link. After visiting the website or clicking on the link, an adversary would gain the ability to execute arbitrary code on the victim system.
References
CVE-2025-24054 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability exploitation_technique T1566 Phishing
Comments
Using a crafted .library-ms file, attackers can exploit this spoofing vulnerability to gain access to NTLM hashes on the system. This was officially patched by Microsoft on March 11, 2025, but has been exploited in the wild as of March 19, 2025.
References
CVE-2025-24054 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability primary_impact T1555 Credentials from Password Stores
Comments
Using a crafted .library-ms file, attackers can exploit this spoofing vulnerability to gain access to NTLM hashes on the system. This was officially patched by Microsoft on March 11, 2025, but has been exploited in the wild as of March 19, 2025.
References

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2024-38112 Microsoft Windows MSHTML Platform Spoofing Vulnerability 2
CVE-2025-24054 Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability 2