CVE-2021-42282

7.5 HIGH

📋 TL;DR

CVE-2021-42282 is an Active Directory Domain Services privilege escalation vulnerability that allows authenticated attackers to gain domain administrator privileges. It affects Windows Server systems running Active Directory Domain Services. Attackers need valid domain credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Windows Server
Versions: Windows Server 2008 SP2 through Windows Server 2022
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Windows Server versions with Active Directory Domain Services role installed. Domain controllers are the primary target.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete domain compromise where attackers gain domain administrator privileges, allowing them to create new accounts, modify existing accounts, install backdoors, and access all domain resources.

🟠

Likely Case

Privilege escalation from standard domain user to domain administrator, enabling lateral movement and persistence within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, privileged access management, and monitoring in place, though domain compromise remains possible.

🌐 Internet-Facing: LOW - Attackers need valid domain credentials and internal network access to exploit this vulnerability.
🏢 Internal Only: HIGH - This is an internal network threat where authenticated users can escalate privileges to compromise the entire domain.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid domain credentials. Public exploit code is available and has been used in real attacks. The attack chain is well-documented and relatively simple to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: November 2021 security updates (KB5007205 for Windows Server 2019, KB5007206 for Windows Server 2022, etc.)

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42282

Restart Required: Yes

Instructions:

1. Apply the November 2021 security updates from Microsoft. 2. Restart affected domain controllers. 3. Verify all domain controllers are patched. 4. Consider applying the patch during maintenance windows as restarts are required.

🔧 Temporary Workarounds

Restrict SAMR protocol access

windows

Limit access to SAMR protocol to reduce attack surface

Configure Windows Firewall to block SAMR protocol (TCP 445) from non-essential systems
Use Group Policy to restrict SAMR access

🧯 If You Can't Patch

  • Implement strict privileged access management and monitor for unusual account activity
  • Segment domain controllers from regular user networks and implement network access controls

🔍 How to Verify

Check if Vulnerable:

Check if November 2021 security updates are installed on domain controllers. Unpatched systems are vulnerable.

Check Version:

wmic qfe list | findstr KB5007205 (adjust KB number for your OS version)

Verify Fix Applied:

Verify KB5007205 (Server 2019), KB5007206 (Server 2022), or equivalent November 2021 patches are installed and domain controllers have been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SAMR protocol activity
  • Account creation/modification by non-administrative users
  • Privilege escalation attempts in security logs

Network Indicators:

  • Unusual SAMR traffic patterns to domain controllers
  • Multiple authentication attempts followed by privilege escalation

SIEM Query:

EventID=4720 OR EventID=4722 OR EventID=4724 from non-privileged accounts OR SAMR protocol anomalies

🔗 References

📤 Share & Export