Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Mahmoud Khalil has allowed him to hold his newborn son for the first time despite objections from the government

Judge blocks large layoffs for Trump administration in education sector

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Critical Windows Server 2025 DMSA vulnerability allows for active directory compromise
Identity

Critical Windows Server 2025 DMSA vulnerability allows for active directory compromise

userBy userMay 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 22, 2025Ravi LakshmananCybersecurity/Vulnerability

Windows Server 2025 demonstrates a flaw in privilege escalation that allows users to be compromised in Active Directory (AD) users.

“The attack was introduced in Windows Server 2025 and takes advantage of the Delegated Managed Service Account (DMSA) feature, which works with default configurations and is easy to implement,” Akamai security researcher Yuval Gordon said in a report shared with Hacker News.

“This issue could be affecting most organizations that rely on AD. In 91% of the environments we investigated, users outside the domain administrators group were found with the permissions needed to carry out this attack.”

What is noteworthy about the attack route is that it takes advantage of a new feature called Delegated Managed Service Accounts (DMSAs), which allows migration from existing legacy service accounts. It was introduced in Windows Server 2025 to mitigate the Kerberoasting attack.

Cybersecurity

Attack technology is codenamed Badsuccessor by web infrastructure and security companies.

“DMSA allows users to create as a standalone account or replace existing standard service accounts,” Microsoft says in the documentation. “If DMSA replaces an existing account, it blocks authentication against an existing account using a password.”

“Requests are redirected to the Local Security Authority (LSA) and authenticated using the DMSA. DMSA has access to everything your previous account has access to in ads. DMSA automatically learns which devices use the service account used to move from all existing service accounts.”

The problem identified by Akamai is that during the DMSA Kerberos authentication phase, the privileged attribute certificate (PAC) embedded in the ticket cultivation ticket issued by the Key Distribution Center (KDC) (i.e., the credentials used to verify the identity) contains both the DMSAS security identifier (SID) and the SID of the SIDs, and both the SIDS of the SIDS.

This permission transfer between accounts can simulate the DMSA migration process to compromise users, including domain administrators, gain similar privileges, and open the door to potential privilege escalation scenarios by effectively violating the entire domain even when your organization’s Windows Server 2025 domain is not using DMSA.

“One interesting fact about this ‘simulated migration’ technique is that it doesn’t require permission to replace the account,” Gordon said. “The only requirement is to write permissions through attributes in DMSA. Any DMSA.”

“After marking the DMSA before the user, KDC will automatically have a legitimate transition and will be willing to assign any and all permissions the original user has.

Cybersecurity

Akamai reported the findings to Microsoft on April 1, 2025, and later said the tech giant had classified the issue moderately severity and that the bar was not fulfilled for immediate service as successful exploitation requires attackers to have specific permissions on the DMSA object. However, the patch is currently under construction.

Given the lack of immediate remediation of attacks, it is recommended that organizations limit their ability to create DMSAS and enhanced authority wherever possible. Akamai has also released a PowerShell script that enumerates all non-default principals that can create DMSAs and allows you to list the organizational units (OUs) that each principal has this permission.

“This vulnerability introduces previously unknown and shocking abuse paths that allow users with OU’s CreateChild permission to compromise users in the domain and gain similar power to the replication directory change privileges used to carry out DCSYNC attacks,” says Gordon.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle Veo 3’s AI video realism broke the internet with a street interview that never happened
Next Article Openai acquires Jony Ive’s AI device startup for $6.5 billion
user
  • Website

Related Posts

Chinese hackers exploit Trimble CityWorks flaws to infiltrate US government networks

May 22, 2025

Chinese hackers exploit Ivanti EPMM bug in global enterprise network attacks

May 22, 2025

Learn how to build a rational and legally defensible cybersecurity program

May 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Mahmoud Khalil has allowed him to hold his newborn son for the first time despite objections from the government

Judge blocks large layoffs for Trump administration in education sector

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Kraken opens the digital tokens of Apple, Tesla, nvidia outside us

Trending Posts

Iran says it will hold us accountable for Israel’s attack on nuclear presence | Military News

May 22, 2025

Trump’s Ramaphosa “Ambshell”: Important Takeout from Heated White House Conference | Donald Trump News

May 22, 2025

Tottenham’s defeat of Man UTD focuses on financial distress | Football News

May 22, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

HALO Security achieves SOC 2 Type 1 compliance and validates security controls of the attack surface management platform

Bitcoin will surge beyond $111,000 from $74,508 a month ago amid new optimism

Openai acquires Jony Ive’s AI device startup for $6.5 billion

Google Veo 3’s AI video realism broke the internet with a street interview that never happened

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.