PT-2025-32855 · Google +4 · Android +6

Yug0Rd

+1

·

Published

2025-08-12

·

Updated

2025-09-29

·

CVE-2025-53779

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions**

Windows Kerberos versions prior to August 2025 Patch Tuesday

**Description**

A relative path traversal vulnerability in Windows Kerberos allows an authorized attacker to elevate privileges over a network. This vulnerability, also known as “BadSuccessor” (CVE-2025-53779), involves the exploitation of delegated Managed Service Accounts (dMSAs) in Windows Server 2025, potentially granting attackers domain administrator rights. The vulnerability was actively exploited in the wild prior to the release of a patch. While the patch addresses the direct privilege escalation path, the underlying technique may persist and should be considered a tactic, technique, and procedure (TTP) by defenders. Approximately 0.7% of Active Directory domains are estimated to be affected.

**Recommendations**

Update your Windows Server 2025 domain controllers to the August 2025 Patch Tuesday update.

Review permissions on Organizational Units (OUs), containers, and dMSA objects, tightening delegations and removing broad rights to restrict access to Tier 0 administrators for creating or modifying dMSAs and their migration link attributes.

Fix

LPE

RCE

Relative Path Traversal

Weakness Enumeration

Related Identifiers

BDU:2025-09690
CVE-2025-53779

Affected Products

Android
Apple
Cisco Ise
Google Chrome
Windows
Windows Kerberos
Wing Ftp Server