A critical and as yet unpatched vulnerability in Windows Server 2025 has shaken the enterprise security community, exposing devastating privilege escalation risks for nearly any Active Directory (AD) environment leveraging the platform. Security researchers at Akamai uncovered the exploit—dubbed “BadSuccessor”—and have warned that this flaw grants attackers the potential to compromise any user, including highly privileged Domain Admins, via a dangerous implementation flaw in the delegated Managed Service Account (dMSA) feature. The threat reportedly exists in virtually every domain hosting at least one Windows Server 2025 domain controller, regardless of whether dMSA is actively in use.
The fundamental intent behind dMSA was positive. Microsoft introduced delegated Managed Service Accounts in Windows Server 2025 as a modern, more secure alternative to legacy service accounts. The approach allows administrators to migrate old, non-managed accounts—often unwieldy or insecure—to tightly governed dMSAs, simplifying credential management and tying account lifecycles to applications and services. The migration is designed to be seamless: the dMSA inherits all necessary permissions from its predecessor, aiming to minimize disruptions and bolster security.
However, Akamai’s researchers (notably Yuval Gordon) spotlighted an alarming oversight at the heart of this process. The migration depends on a single Active Directory attribute: the
Through a multi-step exploration, researchers discovered that:
Compounding the issue, Gordon points out, is that merely having a single Windows Server 2025 domain controller in a mixed forest or domain is sufficient: the dMSA feature is present and can be invoked regardless of whether an organization is actively using it yet. In other words, this is not a “feature misconfiguration”; it’s an architectural risk.
On Microsoft’s side, the company has publicly confirmed the flaw, started work on a fix, and acknowledged the architectural nature of the vulnerability. This transparency is a strong show of trust and responsiveness amidst a rapidly evolving situation.
Importantly, the issue is not isolated to specialized attackers or sophisticated adversaries—almost any user able to create service-type objects in a delegated part of AD can potentially become a domain-wide menace. Organizations that delay applying mitigations are at high risk of exploitation, whether by opportunistic insiders or external adversaries who have gained user-level access.
In the meantime, administrators and CIOs should plan for:
As enterprises continue to modernize their authentication and directory infrastructures, it is imperative to pair innovation with relentless, cross-disciplinary risk assessment. For now, administrators can—and must—deploy defense-in-depth: restrict permissions, audit proactively, and maintain vigilance. The stakes are nothing less than the integrity of your entire domain.
Source: Help Net Security Unpatched Windows Server vulnerability allows full domain compromise - Help Net Security
Anatomy of the Vulnerability: How BadSuccessor Works
The fundamental intent behind dMSA was positive. Microsoft introduced delegated Managed Service Accounts in Windows Server 2025 as a modern, more secure alternative to legacy service accounts. The approach allows administrators to migrate old, non-managed accounts—often unwieldy or insecure—to tightly governed dMSAs, simplifying credential management and tying account lifecycles to applications and services. The migration is designed to be seamless: the dMSA inherits all necessary permissions from its predecessor, aiming to minimize disruptions and bolster security.However, Akamai’s researchers (notably Yuval Gordon) spotlighted an alarming oversight at the heart of this process. The migration depends on a single Active Directory attribute: the
msDS-ManagedAccountPrecededByLink
. This attribute tells the Key Distribution Center (KDC) which legacy account the new dMSA replaces, effectively signaling that the dMSA should be granted the corresponding set of privileges.Through a multi-step exploration, researchers discovered that:
- Initial Security Assumptions Were Broken: While migration operations such as
migrateADServiceAccount
are restricted to Domain Admins, the actual ability to manipulate the critical attribute is not. In other words, domain users with “Create msDS-DelegatedManagedServiceAccount” or the broad “Create all child objects” permission on an Organizational Unit (OU) can create new dMSAs—even if they’re not privileged AD users. - Minimal Attribute Changes Have Maximum Impact: By creating a dMSA and setting the
msDS-ManagedAccountPrecededByLink
to reference any user or computer account—plus toggling a “migration complete” attribute—an attacker can forcibly associate a dMSA with any desired account. The KDC, trusting the attribute, grants the dMSA all the access rights of the linked account, including potentially Domain Admin privileges. - No Obvious Red Flags: This deeply subverts the traditional security model. No group memberships are changed, no accounts obviously elevated, and most standard escalation or privilege monitoring tools and alerts are bypassed. The attack is, to the untrained eye, invisible.
The Attack Flow: Step-By-Step
To demystify the process that attackers might follow, consider this sequence:- Reconnaissance: The attacker identifies an OU where a low-privilege user has the required permission to create child objects or dMSAs. Akamai reports that in 91% of environments surveyed, at least some non-admin users had this permission—a shocking statistic that indicates widespread exposure.
- dMSA Creation: Using this access, the attacker generates a new delegated Managed Service Account in that OU.
- Attribute Manipulation: The attacker sets the pivotal
msDS-ManagedAccountPrecededByLink
attribute of the dMSA to the targeted (victim) account, and marks the migration as “complete.” - Ticket Acquisition: With tools like Rubeus (a common Kerberos exploitation toolkit), the attacker requests a Ticket Granting Ticket (TGT) for the dMSA.
- Privilege Realization: The Key Distribution Center, upon seeing the manipulated attribute, issues a TGT that grants the dMSA all the rights of the linked (potentially highly privileged) account.
- Domain Takeover: The attacker can now authenticate as the victim, moving laterally or exfiltrating data with impunity, while traditional monitoring solutions are likely none the wiser.
Systemic Exposure: An Uncomfortable Reality
Akamai’s findings are as alarming as they are credible. “In 91% of the environments we examined,” researcher Yuval Gordon said, “we found users outside the domain admins group that had the required permissions to perform this attack.” Due to the prevalence of “create all child objects” being delegated to various helpdesk, automation, or application users, this is more rule than exception.Compounding the issue, Gordon points out, is that merely having a single Windows Server 2025 domain controller in a mixed forest or domain is sufficient: the dMSA feature is present and can be invoked regardless of whether an organization is actively using it yet. In other words, this is not a “feature misconfiguration”; it’s an architectural risk.
Notable Strengths in the Research and Disclosure Process
The original research from Akamai is notable for its rigor and transparency. They avoided sensationalism, provided technical proof-of-concept, and supported their claims with reproducible steps, using both built-in Windows Server features and widely available tools like Rubeus. Their public advice is actionable and timely, including detection and mitigation steps that organizations can take even before an official patch is available. This responsible disclosure ensures that Microsoft and the broader security community have the crucial early-warning needed to defend critical systems.On Microsoft’s side, the company has publicly confirmed the flaw, started work on a fix, and acknowledged the architectural nature of the vulnerability. This transparency is a strong show of trust and responsiveness amidst a rapidly evolving situation.
Critical Analysis: The Good, The Bad, and The Avoidable
For a vulnerability of this potential impact, “strengths” are measured not by how the flaw was created, but how it’s being managed and mitigated now. There are positive facets here, but the risks are overwhelming.Strengths and Opportunities
- Modernization of Service Accounts: The move to managed, application-tied service accounts is fundamentally sound. It centralizes control and aims to eliminate the unmanaged sprawl of static service passwords—a real win for security in principle.
- Attribute-Driven Automation: Having a simple, clear-cut migration path in AD is a usability win, and attribute-based automation is often reliable, maintainable, and scriptable for enterprise environments.
- Research Community Vigilance: The rapid uncovering of this flaw, and the immediate, responsible disclosures, highlight the strength of the partnership between third-party security researchers and platform vendors.
Undeniable Risks and Strategic Blunders
- Attribute Trust Model is Too Permissive: The foundational mistake here lies in the attribute-driven nature of the migration. By failing to restrict modification of the pivotal
msDS-ManagedAccountPrecededByLink
, Microsoft created a situation where broad, legitimate permissions (like creating service accounts) can be weaponized for total domain compromise. - Silent Attack Surface: The absence of group membership changes or privilege escalation artifacts means post-compromise forensics are hard. Attackers can live off the land, moving through service accounts at will, rarely triggering alarms.
- Misaligned Permission Defaults: The Windows Server and AD ecosystem has long suffered from over-permissive defaults carried forward for compatibility. Granting “create all child objects” too broadly within OUs may be an operational time-saver, but in this context, it’s a catastrophic risk.
- Exposure by Default: Even organizations not using dMSA are at risk simply by updating a single domain controller to 2025. This “latent” exposure is especially concerning, as many organizations stagger their upgrades across years and would not reasonably expect a single new DC to radically alter their threat landscape.
Mitigation Guidance: What Can Administrators Do Right Now?
Until Microsoft releases a formal patch, proactive steps are urgent:- Restrict dMSA Creation: As an immediate containment measure, trim “Create msDS-DelegatedManagedServiceAccount” or “Create all child objects” AD permissions to only trusted admin groups. Use PowerShell scripts (such as those provided by Akamai) to enumerate and remove or reduce these permissions wherever possible.
- Audit and Monitor: Start monitoring for unusual dMSA creation, attribute changes (especially
msDS-ManagedAccountPrecededByLink
), and authentication patterns involving new dMSAs. Enable comprehensive logging with an emphasis on detailed AD and Kerberos events. - Review Delegation Practices: Conduct a thorough delegation review to re-validate OU-level permissions. Remove or revise legacy permissions that might be artifacts of past projects, helpdesk workflows, or automation rollouts.
- Communicate with Microsoft: Track official advisories from Microsoft regarding this vulnerability. Engage in regular patch management discussions, emphasizing the need to accelerate the deployment of the eventual fix.
Potential Long-Term Impacts on Active Directory Security
This vulnerability—and the approach taken to fix it—will likely have broader implications for the design and deployment of directory-based authentication solutions in Windows environments for years to come.- Re-evaluating Attribute Automation: Vendors and enterprise IT teams may need to reassess the risks of relying solely on object- or attribute-level automation when it governs security-sensitive functions. Attribute assignment must be subject to stricter change controls.
- Zero Trust and Least Privilege: The incident underscores the urgent necessity to deploy zero trust security frameworks, limiting permissions to their bare minimum and continuously auditing all changes.
- Red Team and Blue Team Evolution: The effectiveness of “BadSuccessor” in bypassing traditional detection techniques will spur both offensive and defensive teams to refine their techniques. Expect new detection rules, tools, and hunting strategies focused on anomalous dMSA activity.
- Legacy vs. Modernization Tension: The need to support both legacy and new security models, sometimes in the same AD domain, continues to create friction and attack surface. Organizations may need to move more aggressively toward modern, cloud-anchored directory services or overhaul their AD security baselines.
Industry Reactions and Community Response
The discovery has made waves in the broader IT and security communities. Social feeds and forums are rife with calls for rapid action, stories of “surprise domain admin” demonstrations, and in-depth technical write-ups. Consensus is virtually unanimous: the exposure is real, the exploit is trivial, and the attack can be carried out by anyone with moderate AD scripting knowledge.Importantly, the issue is not isolated to specialized attackers or sophisticated adversaries—almost any user able to create service-type objects in a delegated part of AD can potentially become a domain-wide menace. Organizations that delay applying mitigations are at high risk of exploitation, whether by opportunistic insiders or external adversaries who have gained user-level access.
Looking Forward: When Will a Patch Arrive?
Microsoft is currently developing a formal patch, but deployment timelines for such core AD and DC functionality are inherently complex. Hotfixes, registry-based workarounds, or out-of-band updates may be issued for organizations in acute distress, but there are no public indicators that an immediate fix is imminent. Large enterprises with complex AD topologies must prepare for careful test-and-deploy cycles to ensure business continuity when the update does arrive.In the meantime, administrators and CIOs should plan for:
- Increased scrutiny of all account management operations
- More frequent reviews of permission delegations, especially at the OU level
- Enhanced detection and hunting activities centered on dMSA attributes
Conclusion: A Cautionary Tale for Directory Security
The “BadSuccessor” vulnerability is a clarion call for every organization running Windows Server 2025 or planning an upgrade in the near future. The flaw itself may be a technical footnote in the history of Active Directory, but the lessons are fundamental: attribute-driven automations, if left unchecked, can become the vectors for attack chains of staggering scope. Security by design—not by optimistic permissioning—must be the new normal.As enterprises continue to modernize their authentication and directory infrastructures, it is imperative to pair innovation with relentless, cross-disciplinary risk assessment. For now, administrators can—and must—deploy defense-in-depth: restrict permissions, audit proactively, and maintain vigilance. The stakes are nothing less than the integrity of your entire domain.
Source: Help Net Security Unpatched Windows Server vulnerability allows full domain compromise - Help Net Security