
Semperis has unveiled a critical design flaw in Windows Server 2025's delegated Managed Service Accounts (dMSAs), termed "Golden dMSA." This vulnerability allows attackers to generate service account passwords, facilitating undetected, persistent access across Active Directory environments. (semperis.com)
The flaw resides in the ManagedPasswordId structure of dMSAs, which contains predictable time-based components limited to 1,024 combinations. This predictability renders brute-force password generation computationally trivial, undermining the security model of dMSAs. (semperis.com)
To demonstrate the attack's mechanics, Semperis researcher Adi Malyanker developed "GoldenDMSA," a tool that simulates the exploitation process, aiding defenders in understanding and mitigating the threat. (semperis.com)
The Golden dMSA attack follows a systematic approach:
- KDS Root Key Extraction: Attackers with elevated privileges extract the Key Distribution Service (KDS) root key, the master key for all managed service account passwords.
- dMSA Enumeration: Using APIs like LsaOpenPolicy and LsaLookupSids, attackers enumerate dMSA accounts across the Active Directory forest.
- ManagedPasswordId Identification: Attackers identify the ManagedPasswordId attributes and, due to their predictability, can generate valid passwords through targeted guessing.
- Password Generation and Exploitation: With the derived passwords, attackers can authenticate as any dMSA or gMSA, enabling cross-domain lateral movement and persistent access. (thehackernews.com)
Detection of Golden dMSA exploitation is challenging, as compromising the KDS root key does not generate security events by default. Administrators are advised to configure System Access Control Lists (SACLs) on KDS root key objects to audit read access, thereby generating security events upon unauthorized access attempts. (github.com)
In response to this and related vulnerabilities, Semperis has enhanced its Directory Services Protector (DSP) platform with new indicators to detect and mitigate such exploits. These enhancements, developed in collaboration with Akamai, aim to provide organizations with tools to identify and respond to exploitation attempts before attackers can escalate privileges and compromise the domain. (semperis.com)
Organizations are urged to proactively assess their systems, audit dMSA permissions, and monitor for signs of misuse using enhanced detection tools. Until a patch is released, these measures are essential to mitigate the risk posed by the Golden dMSA vulnerability. (semperis.com)
Source: Australian Cyber Security Magazine Critical Flaw in Windows Server 2025 exposed - Australian Cyber Security Magazine