CVE-2022-26931
📋 TL;DR
CVE-2022-26931 is a Windows Kerberos elevation of privilege vulnerability that allows authenticated attackers to gain domain administrator privileges by exploiting improper validation of Kerberos tickets. This affects Windows domain controllers and systems using Kerberos authentication. Attackers must already have a foothold in the network to exploit this vulnerability.
💻 Affected Systems
- Windows Server
- Windows Client
📦 What is this software?
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 11 by Microsoft
Windows 11 by Microsoft
Windows 7 by Microsoft
Windows 7 by Microsoft
Windows 8.1 by Microsoft
Windows 8.1 by Microsoft
Windows Rt 8.1 by Microsoft
Windows Server by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
An attacker with initial access to a standard domain user account could escalate to domain administrator privileges, enabling complete domain takeover, credential theft, and lateral movement across the entire network.
Likely Case
An attacker with compromised credentials could escalate privileges to gain administrative access to domain controllers and critical systems, leading to data exfiltration, ransomware deployment, or persistent backdoors.
If Mitigated
With proper patch management and network segmentation, the impact is limited to isolated segments, though domain controllers remain critical targets requiring immediate patching.
🎯 Exploit Status
Exploitation requires authenticated access to the domain and knowledge of Kerberos internals. Public proof-of-concept code exists, making exploitation more accessible to attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: May 2022 security updates (KB5013952 for Windows 10, KB5013954 for Windows 11, etc.)
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26931
Restart Required: Yes
Instructions:
1. Apply the May 2022 Windows security updates from Microsoft Update. 2. Restart affected systems. 3. Prioritize patching domain controllers first, then member servers and workstations.
🔧 Temporary Workarounds
Kerberos S4U2Self Hardening
windowsApply registry settings to restrict Kerberos S4U2Self behavior to mitigate exploitation vectors
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters" /v "RestrictS4U2Self" /t REG_DWORD /d 1 /f
🧯 If You Can't Patch
- Implement strict network segmentation to isolate domain controllers from general user networks
- Enforce strong authentication policies and monitor for unusual Kerberos ticket requests
🔍 How to Verify
Check if Vulnerable:
Check if May 2022 security updates are installed via 'wmic qfe list' or 'Get-Hotfix -Id KB5013952' (adjust KB number for your OS version)
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify the security update is installed and check registry key HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters\Mitigations for mitigation settings
📡 Detection & Monitoring
Log Indicators:
- Unusual Kerberos Service for User (S4U) requests in Windows Security Event Logs (Event ID 4769)
- Multiple failed authentication attempts followed by successful privileged access
Network Indicators:
- Abnormal Kerberos ticket requests patterns, especially S4U2Self requests
- Unexpected connections from user workstations to domain controllers
SIEM Query:
EventID=4769 AND TicketOptions="0x40810000" | stats count by AccountName, ClientAddress