Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Critical vulnerability Windows Server 2025 DMSA provides compromise Active Directory
Global Security

Critical vulnerability Windows Server 2025 DMSA provides compromise Active Directory

AdminBy AdminMay 22, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


May 22, 2025Red LakshmananCybersecurity / vulnerability

The Windows Server 2025 showed a shortage of privilege escalation, allowing attackers to compromise any user at Active Directory (AD).

“Attack uses the function of the delegated managed account (DMSA), which was introduced in Windows Server 2025, works with the default configuration and is trivial for implementation,” – Akamai’s safety researcher Gordon Gordon – Note In a report that shared with Hacker News.

“This issue is probably touched upon by the majority of organizations that rely on AD. In the 91% of the environment we have considered, we found users by the Admins Domain group that had the necessary permits to fulfill this attack.”

What makes the path of attack characteristic, this is what it uses a new feature called Delegated Managed Service Accounts (Dmsa) This allows you to migrate from the existing outdated account. It was entered in Windows Server 2025 as a mitigation Kerberoasting Attacks.

Cybersecurity

The attack technique has been named The success of bathing According to the web -infrastructure and security campaign.

“DMSA allows users to create them as an autonomous account or replace an existing standard account,” Microsoft notes in their documentation. “If DMSA replaces the existing account, authentication of this account using its password is blocked.”

“The request is redirected to the local security body (LSA) to authentication using DMSA, which has access to everything you can access to AD. During the DMSA migration, the devices that should be used to transition from all existing accounts must be used during migration.”

The problem defined by Akamai is that during DMSA Kerberos Authentication phase, privilege attribute (PAC) Certificate (PAC), built into a ticket that issues a ticket (ie credentials used to verify identity) issued by the Key Distribution Center (KDC) includes both DMSA security identifiers (Sid), as well as AIDS with a involved service account and all related groups.

This transfer of permits between accounting records can open the door to the potential escalation scenario by modeling the DMSA migration process for any user, including domain administrators, and get similar privileges, violating the entire domain, even if the Windows 2025 domain does not use DMSAS.

“One interesting fact of this” modeling “technique is that it does not require any permits for a confined account,” Gordon said. “The only requirement is to write permits for DMSA attributes. Any DMSA.”

“Once we have noted DMSA, as the users preceded, KDC automatically suggests that legitimate migration has taken place and is happy to provide our DMSA every permit that was the original user as if we were a legal successor.”

Cybersecurity

Akamai said it reports on the results of Microsoft on April 1, 2025, after which the technological giant classified the issue as moderate and that it does not match the fee for immediate service from the fact that successful exploitation requires the attacker to have specific DMSA objects, which suggests the height of the privileges. However, the patch is currently working.

Considering that there is no immediate correction to the attack, organizations are advised to restrict the possibility of creating DMSA and solving permits where possible. Akamai also has liberated The PowerShell script that can list all the directors who do not deficit, which can create DMSA and list organizational units (OUS) in which each director has this permit.

“This vulnerability introduces previously unknown and high impact abuse that allows any user with the Createchild permission to compromise any user in the domain and get similar power to remake the changes of the catalogs used to implement DCSync attacks,” Gordon said.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025

Firewall web applications with open source with zero day detection and bot protection

May 23, 2025

The US Demonrates Danabot Malf

May 23, 2025

Duo Gitlab’s vulnerability allowed the attackers to steal AI with hidden tips

May 23, 2025

CISA warns of suspicion of extensive Saas attacks that exploit app secrets and incorrect cloud settings

May 23, 2025

Chinese hackers operate the shortage of CityWorks Trimble to penetrate the US public networks

May 22, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hackers use Tiktok videos to distribute Widar and Crealc Malsware by Clickfix technique

May 23, 2025

Vicoviodtrap uses the lack of Cisco to create global Honeypot with 5300 compromised devices

May 23, 2025

300 servers and € 3.5 million, confiscated when Europe Strikes Ransomwark Networks worldwide

May 23, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.