Windows Server 2025, still in preview but already being tested in production-like environments, was supposed to represent Microsoft's next step in enterprise-grade directory services. Yet, a critical vulnerability quietly lurking in its newest Active Directory feature has upended that promise with unsettling speed. Known as “BadSuccessor,” this attack leverages delegated Managed Service Accounts (dMSA) in a way that experts describe as alarmingly simple and dangerously effective, with serious ramifications for any organization looking to upgrade—or even evaluate—Microsoft’s on-premises identity infrastructure.
At the heart of this vulnerability is the dMSA, an evolution of Managed Service Accounts (MSA), and Group Managed Service Accounts (gMSA), which are popular for automating credential management for applications and services within Active Directory (AD). Delegated MSAs were designed to introduce greater flexibility by allowing non-administrative users to request and assign accounts for various services, thereby streamlining service identity management and reducing reliance on more privileged administrator roles.
But according to Akamai’s Yuval Gordon, who is credited with discovering the BadSuccessor flaw, this convenience comes at an unexpectedly high price. The attack chain exploits the way dMSA migrations inherit permissions from legacy accounts and how Active Directory processes these changes. The attack requires only minimal, commonly granted permissions on an Organizational Unit (OU)—not direct access or elevated rights to the target account, making it what security researchers call a “low-friction” attack surface.
The practical upshot is chilling: with only a couple of attribute changes, an attacker with “benign” permissions on a single OU (which 91% of surveyed environments permitted, according to Akamai) can create a dMSA, link it to a high-value account, and instantly enjoy administrative powers across the entire domain. There’s no need for direct manipulation or rights over the privileged account itself. Even more perilous, this method can reportedly be used to extract secret keys associated with target accounts, enabling attackers to pose as any user—including those with the highest levels of domain authority.
As Gordon summarizes, “With just two attribute changes, a humble new object is crowned the successor and the KDC never questions the bloodline; if the link is there, the privileges are granted.”
Akamai’s research found that non-administrative users in 91% of the AD environments they examined had sufficient access to exploit this bug. This isn’t a theoretical edge case but a systemic threat that may impact almost every enterprise evaluating or testing Windows Server 2025 Domain Controllers at this stage.
More troubling still, Microsoft has, for now, downplayed the urgency of this flaw. In a statement to Forbes, the company rated the risk as “Moderate severity” and said it does not warrant immediate patching, reasoning that the attack “requires elevated user permissions.” Akamai, however, flatly disputes this. They argue that the sorts of permissions required are not just elevated but often viewed as operationally safe, meaning thousands of organizations may be exposed and expecting normal security postures to be sufficient.
Gordon even likens the potential damage to the notorious DCSync attack, which enables extraction of password hashes for all users, including krbtgt (the forest trust account), making total domain compromise possible.
Technically, when migrating legacy service accounts—those with explicit, sometimes forgotten or excessive, permissions—AD’s dMSA creation mechanism inherits certain properties for continuity and backward compatibility. The
This logic is, in hindsight, brittle. It trusts the existence of a “link” rather than validating the chain of custody, opening the door to arbitrary privilege assignment based on a writeable directory property.
Strengths of the dMSA Design:
Akamai and other researchers disagree with this assessment, pointing out that widespread delegation models, organizational nesting, and “shadow admin” roles mean the dMSA creation right is not at all rare. As identity and security teams know, it is often the benign-seeming, everyday permission that provides the best launching pad for determined attackers.
Cybersecurity industry voices have flagged this classification as problematic, warning that treatable vulnerabilities—even outside the “critical” category—should be proactively addressed before widespread exploitation occurs. The potential for this attack to be weaponized in ransomware, espionage, or supply chain operations is not lost on security professionals.
In parallel, Microsoft could—and should—invest more in detection and reporting for dMSA abuse, potentially providing out-of-the-box monitoring and smarter alerts within Azure AD Connect, Active Directory Administrative Center, or Windows Defender for Identity.
Most critically, Microsoft’s response to this episode will shape how enterprises gauge the security of future on-premises offerings. As AD remains a foundational technology for businesses worldwide, maintaining trust hinges on proactive, transparent handling of modern attack vectors.
While it’s tempting to adopt the latest features for convenience or efficiency, the breach exposed by BadSuccessor demonstrates that the intersection of new capabilities and old privileges still harbors surprises. Defenders must remain vigilant, applying the principle of least privilege with fresh scrutiny and recognizing that in a connected world, even a single “benign” permission can unlock the entire kingdom.
For now, the best defense is heightened awareness, thorough auditing, and active monitoring—paired with an insistence that vendors treat privilege escalation flaws with the full seriousness they deserve. The future of secure authentication in Windows environments may depend on how quickly the lessons of BadSuccessor are learned.
Source: CybersecurityNews New Attack Exploits dMSA in Windows Server 2025 to Compromise Any Active Directory Users
Breaking Down BadSuccessor: Anatomy of a Critical Flaw
At the heart of this vulnerability is the dMSA, an evolution of Managed Service Accounts (MSA), and Group Managed Service Accounts (gMSA), which are popular for automating credential management for applications and services within Active Directory (AD). Delegated MSAs were designed to introduce greater flexibility by allowing non-administrative users to request and assign accounts for various services, thereby streamlining service identity management and reducing reliance on more privileged administrator roles.But according to Akamai’s Yuval Gordon, who is credited with discovering the BadSuccessor flaw, this convenience comes at an unexpectedly high price. The attack chain exploits the way dMSA migrations inherit permissions from legacy accounts and how Active Directory processes these changes. The attack requires only minimal, commonly granted permissions on an Organizational Unit (OU)—not direct access or elevated rights to the target account, making it what security researchers call a “low-friction” attack surface.
How the Exploit Works
Akamai’s analysis shows that when upgrading from a legacy service account to a dMSA, the new dMSA may take on its predecessor’s permissions. Key to the BadSuccessor exploit are two relatively obscure Active Directory object attributes:msDS-ManagedAccountPrecededByLink
and another (often internal-use) metadata property. By setting the msDS-ManagedAccountPrecededByLink
attribute on a newly created dMSA to reference a privileged account—such as a Domain Admin—the attacker tricks the Key Distribution Center (KDC) into granting the dMSA all of that principal's privileges upon authentication.The practical upshot is chilling: with only a couple of attribute changes, an attacker with “benign” permissions on a single OU (which 91% of surveyed environments permitted, according to Akamai) can create a dMSA, link it to a high-value account, and instantly enjoy administrative powers across the entire domain. There’s no need for direct manipulation or rights over the privileged account itself. Even more perilous, this method can reportedly be used to extract secret keys associated with target accounts, enabling attackers to pose as any user—including those with the highest levels of domain authority.
As Gordon summarizes, “With just two attribute changes, a humble new object is crowned the successor and the KDC never questions the bloodline; if the link is there, the privileges are granted.”
Surfacing a Hidden Risk: Benign Permissions, Catastrophic Consequences
Critically, the BadSuccessor vulnerability doesn’t rely on esoteric AD configurations or seldom-used legacy features. Instead, it takes advantage of routine delegated permissions that are widespread in large organizations. Modern AD delegation models encourage the principle of least privilege, which paradoxically leads administrators to grant minimal rights on OUs for operational efficiency—something now revealed to carry hidden risks.Akamai’s research found that non-administrative users in 91% of the AD environments they examined had sufficient access to exploit this bug. This isn’t a theoretical edge case but a systemic threat that may impact almost every enterprise evaluating or testing Windows Server 2025 Domain Controllers at this stage.
More troubling still, Microsoft has, for now, downplayed the urgency of this flaw. In a statement to Forbes, the company rated the risk as “Moderate severity” and said it does not warrant immediate patching, reasoning that the attack “requires elevated user permissions.” Akamai, however, flatly disputes this. They argue that the sorts of permissions required are not just elevated but often viewed as operationally safe, meaning thousands of organizations may be exposed and expecting normal security postures to be sufficient.
Gordon even likens the potential damage to the notorious DCSync attack, which enables extraction of password hashes for all users, including krbtgt (the forest trust account), making total domain compromise possible.
Exploit Impact: What Can Attackers Achieve?
The direct consequences of a BadSuccessor attack are hard to overstate. Attackers can:- Instantly escalate privileges to match any chosen user, including Domain Admins, Enterprise Admins, or even sensitive service accounts.
- Move laterally within the environment, posing as service or user accounts that normally enjoy little scrutiny.
- Extract encryption keys linked to target accounts, enabling “golden ticket” attacks—whereby attackers can generate valid Kerberos tickets and access domain resources at will.
- Bypass isolation or tiering mechanisms that are meant to segregate privilege levels within an AD forest.
Why Windows Server 2025? Context for the Feature and the Flaw
Windows Server 2025 continues Microsoft’s long-term efforts to modernize identity platforms. Delegated MSAs were designed to reduce administrative friction and lower operational risk by enabling more flexible account provisioning. But with complexity comes new attack surface, and the dMSA model introduces a crucial means for attackers to bridge the gap between “routine” delegation and catastrophic privilege escalation.Technically, when migrating legacy service accounts—those with explicit, sometimes forgotten or excessive, permissions—AD’s dMSA creation mechanism inherits certain properties for continuity and backward compatibility. The
msDS-ManagedAccountPrecededByLink
attribute is introduced to track this migration and transfer relationship. But researchers now show that simply setting this attribute, even outside a sanctioned migration process, causes AD to blindly extend privileges from the referenced account to the dMSA.This logic is, in hindsight, brittle. It trusts the existence of a “link” rather than validating the chain of custody, opening the door to arbitrary privilege assignment based on a writeable directory property.
Investigative Verification: Confirming the Attack Path
Multiple independent reports and technical write-ups confirm Akamai’s findings on how dMSA object manipulation leads to full domain compromise. Security researchers have validated that:- Even minimal permissions to create or modify dMSA objects on any OU create the preconditions necessary for attack.
- Setting the
msDS-ManagedAccountPrecededByLink
attribute on a dMSA object suffices to transfer all group memberships, rights, and in some cases, even sensitive secret keys to the attacker-controlled account. - These operations are supported by default in the latest Windows Server 2025 builds and require no exploit of memory corruption, protocol flaw, or password guessing.
Defensive Measures: What Can Be Done Now?
Until Microsoft issues a definitive patch—a process that may stretch for weeks or months given the “moderate” rating—experts strongly recommend that organizations audit and harden their AD environments.Immediate Mitigations Include:
- Audit dMSA Creation Events: Monitor for Event ID 5137, which signals new object creation—specifically dMSAs—within AD.
- Track Attribute Modifications: Watch for Event ID 5136, which logs changes to directory object attributes like
msDS-ManagedAccountPrecededByLink
. - Monitor dMSA Authentication Attempts: Event ID 2946 can highlight when dMSAs are used for authentication, especially in unexpected contexts.
- Restrict Permissions: Scrutinize and, where possible, revoke the ability for non-administrative users to create or modify dMSAs across the domain. This may mean restructuring delegation models or implementing just-in-time access controls.
Best Practices Going Forward
- Restrict service account management to only trusted and monitored administrative groups.
- Only permit dMSA creation on OUs that are isolated and monitored.
- Regularly review AD delegation rules, especially those that grant write or modify rights to service accounts or their associated attributes.
- Update threat modeling to include novel identity attacks enabled by new Windows Server features.
Critical Analysis: Balancing Usability and Security
The BadSuccessor attack is a classic example of what security architects call a “feature flaw”—a risk introduced not by a coding bug, but by architectural or design decisions that fail to anticipate attacker ingenuity. The drive to empower non-admins and decentralize service account management collides directly with the complex, interconnected privileges that pervade most Active Directory deployments.Strengths of the dMSA Design:
- Reduces administrative bottlenecks, enabling faster deployment and less reliance on central IT.
- Automates password rotation, which can otherwise be a major operational weakness.
- Extends modern security hygiene to legacy services without requiring disruptive migrations.
- Hidden dependencies and inherited permissions can outlive account owners or audit reviews.
- The lack of explicit validation on critical attributes like
msDS-ManagedAccountPrecededByLink
enables privilege escalation with little forensic trace. - Under-appreciated delegation rights expand the risk beyond what most administrators expect.
What the Industry Says: Severity Debate and Real-World Implications
Microsoft’s decision to rate this vulnerability as only “moderate” reflects a nuanced, and perhaps overly optimistic, security posture. The company stresses that “elevated permissions” are required, but downplays how easily such rights can be obtained or overlooked in sprawling environments.Akamai and other researchers disagree with this assessment, pointing out that widespread delegation models, organizational nesting, and “shadow admin” roles mean the dMSA creation right is not at all rare. As identity and security teams know, it is often the benign-seeming, everyday permission that provides the best launching pad for determined attackers.
Cybersecurity industry voices have flagged this classification as problematic, warning that treatable vulnerabilities—even outside the “critical” category—should be proactively addressed before widespread exploitation occurs. The potential for this attack to be weaponized in ransomware, espionage, or supply chain operations is not lost on security professionals.
Lessons for Enterprise Security Teams
For organizations deploying or piloting Windows Server 2025, the key lesson is this: new capabilities often bring hidden risks, especially when they intersect with legacy privilege models like those in AD.- Do not assume default rights on new features are harmless. Always review new schema extensions or account types for hidden delegation paths.
- Monitor change logs and early vulnerability disclosures from trusted researchers and vendors. The security research community often spots attack vectors that developers and product teams overlook under real-world conditions.
- Perform regular privilege audits with tools designed to surface “shadow admin” rights and cross-object privilege inheritance.
- Invest in continuous monitoring and behavioral analytics for identity infrastructure. The window for exploitation may be small if attackers are detected early in the privilege escalation process.
Toward a Safer Future: Microsoft’s Options
Although Microsoft has signaled that a fix is coming, the approach is unclear. A robust patch could require the KDC to verify the legitimacy ofmsDS-ManagedAccountPrecededByLink
entries and restrict their setting to truly privileged accounts or system processes. Retrofitting such logic without disrupting legitimate account migrations will pose a challenge.In parallel, Microsoft could—and should—invest more in detection and reporting for dMSA abuse, potentially providing out-of-the-box monitoring and smarter alerts within Azure AD Connect, Active Directory Administrative Center, or Windows Defender for Identity.
Most critically, Microsoft’s response to this episode will shape how enterprises gauge the security of future on-premises offerings. As AD remains a foundational technology for businesses worldwide, maintaining trust hinges on proactive, transparent handling of modern attack vectors.
Conclusion: Rethinking Active Directory Security in the Modern Era
BadSuccessor is yet another wake-up call for the IT industry’s reliance on “glue” technologies that power enterprise authentication—especially when innovation pushes complexity into domains where security assumptions have remained static for decades. Delegated Managed Service Accounts offer clear operational benefits, but until security architecture catches up with the risks, every organization running or piloting Windows Server 2025 should urgently review delegation models, tighten permissions, and deploy monitoring.While it’s tempting to adopt the latest features for convenience or efficiency, the breach exposed by BadSuccessor demonstrates that the intersection of new capabilities and old privileges still harbors surprises. Defenders must remain vigilant, applying the principle of least privilege with fresh scrutiny and recognizing that in a connected world, even a single “benign” permission can unlock the entire kingdom.
For now, the best defense is heightened awareness, thorough auditing, and active monitoring—paired with an insistence that vendors treat privilege escalation flaws with the full seriousness they deserve. The future of secure authentication in Windows environments may depend on how quickly the lessons of BadSuccessor are learned.
Source: CybersecurityNews New Attack Exploits dMSA in Windows Server 2025 to Compromise Any Active Directory Users