Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Your AI agents can trace the data – see this webinar to learn how to stop

July 4, 2025

Google ordered to pay 314 million for abuse of cellular Android users without permission

July 4, 2025

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Critical vulnerability Windows Server 2025 DMSA provides compromise Active Directory
Global Security

Critical vulnerability Windows Server 2025 DMSA provides compromise Active Directory

AdminBy AdminMay 22, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 22, 2025Red LakshmananCybersecurity / vulnerability

The Windows Server 2025 showed a shortage of privilege escalation, allowing attackers to compromise any user at Active Directory (AD).

“Attack uses the function of the delegated managed account (DMSA), which was introduced in Windows Server 2025, works with the default configuration and is trivial for implementation,” – Akamai’s safety researcher Gordon Gordon – Note In a report that shared with Hacker News.

“This issue is probably touched upon by the majority of organizations that rely on AD. In the 91% of the environment we have considered, we found users by the Admins Domain group that had the necessary permits to fulfill this attack.”

What makes the path of attack characteristic, this is what it uses a new feature called Delegated Managed Service Accounts (Dmsa) This allows you to migrate from the existing outdated account. It was entered in Windows Server 2025 as a mitigation Kerberoasting Attacks.

Cybersecurity

The attack technique has been named The success of bathing According to the web -infrastructure and security campaign.

“DMSA allows users to create them as an autonomous account or replace an existing standard account,” Microsoft notes in their documentation. “If DMSA replaces the existing account, authentication of this account using its password is blocked.”

“The request is redirected to the local security body (LSA) to authentication using DMSA, which has access to everything you can access to AD. During the DMSA migration, the devices that should be used to transition from all existing accounts must be used during migration.”

The problem defined by Akamai is that during DMSA Kerberos Authentication phase, privilege attribute (PAC) Certificate (PAC), built into a ticket that issues a ticket (ie credentials used to verify identity) issued by the Key Distribution Center (KDC) includes both DMSA security identifiers (Sid), as well as AIDS with a involved service account and all related groups.

This transfer of permits between accounting records can open the door to the potential escalation scenario by modeling the DMSA migration process for any user, including domain administrators, and get similar privileges, violating the entire domain, even if the Windows 2025 domain does not use DMSAS.

“One interesting fact of this” modeling “technique is that it does not require any permits for a confined account,” Gordon said. “The only requirement is to write permits for DMSA attributes. Any DMSA.”

“Once we have noted DMSA, as the users preceded, KDC automatically suggests that legitimate migration has taken place and is happy to provide our DMSA every permit that was the original user as if we were a legal successor.”

Cybersecurity

Akamai said it reports on the results of Microsoft on April 1, 2025, after which the technological giant classified the issue as moderate and that it does not match the fee for immediate service from the fact that successful exploitation requires the attacker to have specific DMSA objects, which suggests the height of the privileges. However, the patch is currently working.

Considering that there is no immediate correction to the attack, organizations are advised to restrict the possibility of creating DMSA and solving permits where possible. Akamai also has liberated The PowerShell script that can list all the directors who do not deficit, which can create DMSA and list organizational units (OUS) in which each director has this permit.

“This vulnerability introduces previously unknown and high impact abuse that allows any user with the Createchild permission to compromise any user in the domain and get similar power to remake the changes of the catalogs used to implement DCSync attacks,” Gordon said.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Your AI agents can trace the data – see this webinar to learn how to stop

July 4, 2025

Google ordered to pay 314 million for abuse of cellular Android users without permission

July 4, 2025

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Your AI agents can trace the data – see this webinar to learn how to stop

July 4, 2025

Google ordered to pay 314 million for abuse of cellular Android users without permission

July 4, 2025

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Your AI agents can trace the data – see this webinar to learn how to stop

July 4, 2025

Google ordered to pay 314 million for abuse of cellular Android users without permission

July 4, 2025

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.