PT-2022-2476 · Microsoft · Windows Active Directory Certificate Services +2
Ly4K
·
Published
2022-05-10
·
Updated
2025-08-21
·
CVE-2022-26923
9.0
High
Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Microsoft Active Directory Domain Services (affected versions not specified)
Microsoft Windows Active Directory Certificate Services (affected versions not specified)
Description:
The issue is related to a privilege escalation vulnerability in Microsoft Active Directory Domain Services and Active Directory Certificate Services. This vulnerability allows attackers to create a machine account within a domain, enabling Kerberoasting attacks to extract service account credentials from domain controllers. The vulnerability can be exploited by adding fake data to a certificate request, allowing an attacker to obtain a certificate that permits authentication on a domain controller with high privileges. Cybercriminals have been evolving social engineering tactics and exploiting this vulnerability in sophisticated campaigns.
Recommendations:
As a temporary workaround, consider disabling the vulnerable component until a patch is available.
Restrict access to the vulnerable module to minimize the risk of exploitation.
Avoid using vulnerable parameters in affected API endpoints until the issue is resolved.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
LPE
Improper Certificate Validation
Improper Privilege Management
Related Identifiers
Affected Products
References · 68
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/dcerpc/cve_2022_26923_certifried.rb⭐ 35019 🔗 14201 · Exploit
- 🔥 https://github.com/LudovicPatho/CVE-2022-26923_AD-Certificate-Services⭐ 44 🔗 14 · Exploit
- 🔥 https://github.com/evilashz/PIGADVulnScanner⭐ 45 🔗 12 · Exploit
- 🔥 https://github.com/lsecqt/CVE-2022-26923-Powershell-POC⭐ 17 🔗 8 · Exploit
- 🔥 https://github.com/r1skkam/TryHackMe-CVE-2022-26923⭐ 6 🔗 3 · Exploit
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26923 · Vendor Advisory
- https://bdu.fstec.ru/vul/2022-02883 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2022-26923 · Vendor Advisory
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26923 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26923 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-22-729 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-26923 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2022-26923 · Security Note
- https://twitter.com/the_yellow_fall/status/1824626683904921961 · Twitter Post
- https://t.me/echeloneyes/593 · Telegram Post