PT-2025-32855 · Google+4 · Google Chrome+6
Yug0Rd
+1
·
Published
2025-08-12
·
Updated
2025-10-16
·
CVE-2025-53779
CVSS v2.0
9.0
High
| AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Windows Kerberos versions prior to August 2025 Patch Tuesday
Description
A relative path traversal vulnerability in Windows Kerberos allows an authorized attacker to elevate privileges over a network. This vulnerability, also known as “BadSuccessor” (CVE-2025-53779), involves the exploitation of delegated Managed Service Accounts (dMSAs) in Windows Server 2025, potentially granting attackers domain administrator rights. The vulnerability was actively exploited in the wild prior to the release of a patch. While the patch addresses the direct privilege escalation path, the underlying technique may persist and should be considered a tactic, technique, and procedure (TTP) by defenders. Approximately 0.7% of Active Directory domains are estimated to be affected.
Recommendations
Update your Windows Server 2025 domain controllers to the August 2025 Patch Tuesday update.
Review permissions on Organizational Units (OUs), containers, and dMSA objects, tightening delegations and removing broad rights to restrict access to Tier 0 administrators for creating or modifying dMSAs and their migration link attributes.
Fix
LPE
RCE
Relative Path Traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Android
Apple
Cisco Ise
Google Chrome
Windows
Windows Kerberos
Wing Ftp Server