Microsoft Active Directory Domain Services (AD DS) Privilege Escalation Vulnerability (CVE-2021-42278 & CVE-2021-42287)

Following the release of a proof-of-concept (PoC) tool on December 12, Microsoft is advising users to repair two security vulnerabilities (tracked as CVE-2021-42287 and CVE-2021-42278) in Active Directory domain controllers that it addressed in November. 
Both flaws are categorized as “Windows Active Directory domain service privilege-escalation” flaws with a CVSS criticality score of 7.5 out of 10. 
On Microsoft Windows Server, Active Directory is a directory service for identity and access management. Even though the flaws were rated as “exploitation Less Likely” in Google’s assessment, the public exposure of the PoC available on GitHub has spurred additional calls for the fixes to be implemented to prevent threat actors from exploiting them. 
An attacker can modify the SAM-Account-Name attribute, which is used to log a user into Active Directory domain systems, with CVE-2021-42278, and impersonate domain controllers with CVE-2021-42287. This effectively enables a bad actor with domain user credentials domain admin user access. 
Affected versions  
The vulnerabilities (CVE-2021-42278 & CVE-2021-42287) affect the Active Directory Domain Services (AD DS) component. 
All domain controllers should be updated using the steps and information provided in the following knowledgebase articles: KB5008102KB5008380, and KB5008602. 
Qualys Detection  
Qualys customers can scan their devices with QID 91835 to detect vulnerable assets.  
Please continue to follow Qualys Threat Protection for more coverage on the latest vulnerabilities.  

Leave a Reply

Your email address will not be published. Required fields are marked *