Описание
Active Directory Domain Services Elevation of Privilege Vulnerability
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
FAQ
What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
How could an attacker exploit this vulnerability?
An attacker could exploit this issue by adding specially crafted Unicode characters to duplicate Service Principal Names (SPNs) or User Principal Names (UPNs). These characters bypass normal Active Directory checks designed to prevent duplicates. If the attacker has permission to modify SPNs on any account, they can create a duplicate SPN for a targeted service. When clients request Kerberos authentication for that service, the domain controller may issue a ticket encrypted with the wrong key, causing the service to reject the ticket. This can lead to a denial of service or force the service to fall back to NTLM authentication if it is enabled. No access to the targeted server is required beyond the initial SPN‑write permission.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Windows Server 2012 | ||
| Windows Server 2012 (Server Core installation) | ||
| Windows Server 2012 R2 | ||
| Windows Server 2012 R2 (Server Core installation) | ||
| Windows Server 2016 | ||
| Windows 10 Version 1607 for 32-bit Systems | ||
| Windows 10 Version 1607 for x64-based Systems | ||
| Windows Server 2016 (Server Core installation) | ||
| Windows 10 Version 1809 for 32-bit Systems | ||
| Windows 10 Version 1809 for x64-based Systems |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
EPSS
8.8 High
CVSS3
Связанные уязвимости
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
Уязвимость службы Active Directory Domain Services (AD DS) операционных систем Windows, позволяющая нарушителю повысить свои привилегии
EPSS
8.8 High
CVSS3