CVE-2022-26931

7.5 HIGH

📋 TL;DR

CVE-2022-26931 is a Windows Kerberos elevation of privilege vulnerability that allows authenticated attackers to gain domain administrator privileges by exploiting improper validation of Kerberos tickets. This affects Windows domain controllers and systems using Kerberos authentication. Attackers must already have a foothold in the network to exploit this vulnerability.

💻 Affected Systems

Products:
  • Windows Server
  • Windows Client
Versions: Windows Server 2022, 2019, 2016, 2012 R2, 2012, 2008 R2 SP1, 2008 SP2; Windows 11, 10, 8.1, 7 SP1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Domain controllers are the primary target, but any system using Kerberos authentication in a Windows domain environment is potentially affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with initial access to a standard domain user account could escalate to domain administrator privileges, enabling complete domain takeover, credential theft, and lateral movement across the entire network.

🟠

Likely Case

An attacker with compromised credentials could escalate privileges to gain administrative access to domain controllers and critical systems, leading to data exfiltration, ransomware deployment, or persistent backdoors.

🟢

If Mitigated

With proper patch management and network segmentation, the impact is limited to isolated segments, though domain controllers remain critical targets requiring immediate patching.

🌐 Internet-Facing: LOW - This vulnerability requires authenticated access to the domain and cannot be exploited directly from the internet without prior compromise.
🏢 Internal Only: HIGH - This is an internal network threat that can lead to complete domain compromise if exploited by an attacker with initial access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to the domain and knowledge of Kerberos internals. Public proof-of-concept code exists, making exploitation more accessible to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2022 security updates (KB5013952 for Windows 10, KB5013954 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26931

Restart Required: Yes

Instructions:

1. Apply the May 2022 Windows security updates from Microsoft Update. 2. Restart affected systems. 3. Prioritize patching domain controllers first, then member servers and workstations.

🔧 Temporary Workarounds

Kerberos S4U2Self Hardening

windows

Apply registry settings to restrict Kerberos S4U2Self behavior to mitigate exploitation vectors

reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters" /v "RestrictS4U2Self" /t REG_DWORD /d 1 /f

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate domain controllers from general user networks
  • Enforce strong authentication policies and monitor for unusual Kerberos ticket requests

🔍 How to Verify

Check if Vulnerable:

Check if May 2022 security updates are installed via 'wmic qfe list' or 'Get-Hotfix -Id KB5013952' (adjust KB number for your OS version)

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify the security update is installed and check registry key HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters\Mitigations for mitigation settings

📡 Detection & Monitoring

Log Indicators:

  • Unusual Kerberos Service for User (S4U) requests in Windows Security Event Logs (Event ID 4769)
  • Multiple failed authentication attempts followed by successful privileged access

Network Indicators:

  • Abnormal Kerberos ticket requests patterns, especially S4U2Self requests
  • Unexpected connections from user workstations to domain controllers

SIEM Query:

EventID=4769 AND TicketOptions="0x40810000" | stats count by AccountName, ClientAddress

🔗 References

📤 Share & Export