Patch
CVE-2024-43451
with vRx
❗ CVE-2024-43451 is a vulnerability in systems that allow NTLM authentication, a legacy protocol that can be exploited for credential relay attacks or brute force attacks. This vulnerability arises when NTLM is enabled, leaving systems susceptible to unauthorized access, potentially disclosing the user's NTLMv2 hash to an attacker with only minimal interaction.
ℹ️ This mitigation script works as follows:
Registry Path Update: Modifies the registry value LmCompatibilityLevel located at HKLM:\SYSTEM\CurrentControlSet\Control\Lsa.
Set Compatibility Level: Changes LmCompatibilityLevel to 5, which enforces NTLMv2-only authentication and disables NTLMv1, effectively reducing the system’s vulnerability to credential relay attacks.
Status Confirmation: Outputs a message confirming that NTLM authentication has been disabled.
✅ By disabling NTLM and enforcing NTLMv2-only authentication, this script ensures that systems are protected against CVE-2024-43451. This mitigation strengthens the security posture by requiring more robust authentication mechanisms, significantly reducing the attack surface for credential spoofing and relay attacks.
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
More than 600 customers trust vRx:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.