Sunday, June 15, 2025
HomeCVE/vulnerabilityActive Directory Domain Service Bug Let Attackers To Takeover Windows Domains

Active Directory Domain Service Bug Let Attackers To Takeover Windows Domains

Published on

SIEM as a Service

Follow Us on Google News

During the November 2021 Patch Tuesday Two Active Directory domain service privilege escalation security flaws have been detected recently by Andrew Bartlett of Catalyst IT, and these two security flaws allow hackers to take over Windows domains easily when they are united.

Microsoft suggested users to immediately patch these two Active Directory domain service privilege escalation security flaws that are tracked as:-

  • CVE-2021-42287: KDC bamboozling
  • CVE-2021-42278: SAM Name impersonation

Here’s what Microsoft stated:-

- Advertisement - Google News

“This escalation attack allows attackers to easily elevate their privilege to that of a Domain Admin once they compromise a regular user in the domain. As always, we strongly advise deploying the latest patches on the domain controllers as soon as possible.”

In default configurations from standard Active Directory user to a Domain Admin can easily use the tool to escalate these privileges. While apart from this, for a given object several naming schemes are used by AD (Active Directory) and they are like:-

  • userPrincipalName (UPN)
  • sAMAccountName (SAM-Account)

How to find the sAMAccountNames?

To find the sAMAccountNames you have to follow some simple steps that we have mentioned below:-

  • First, you have to Click View option.
  • Then select the Advanced Features.
  • After that, you have to open the properties of an object.
  • Then Attribute Editor tab.
  • Lastly, scroll down to sAMAccountName.

Identify Potential Compromised Computers

To identify potentially compromised systems and servers Microsoft has shared detailed guidance, and here we have mentioned them below:-

  • The sAMAccountName change is based on event 4662. Please make sure to enable it on the domain controller to catch such activities.
  • Open Microsoft 365 Defender and navigate to Advanced Hunting.
  • Copy the following query:-

IdentityDirectoryEvents

| where Timestamp > ago(1d)

| where ActionType == “SAM Account Name changed”

| extend FROMSAM = parse_json(AdditionalFields)[‘FROM SAM Account Name’]

| extend TOSAM = parse_json(AdditionalFields)[‘TO SAM Account Name’]

| where (FROMSAM has “$” and TOSAM !has “$”)

        or TOSAM in (“DC1”, “DC2”, “DC3”, “DC4”) // DC Names in the org

| project Timestamp, Application, ActionType, TargetDeviceName, FROMSAM, TOSAM, ReportId, AdditionalFields

  • Replace the marked area with the naming convention of your domain controllers.
  • Run the query and analyze the results which contain the affected devices.
  • Thoroughly examine all the compromised computers and servers to determine whether they have been weaponized or not.

By following the above steps you can easily identify potentially compromised systems and servers to take proper mitigations to avoid such attacks in the future.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Severe WSO2 SOAP Flaw Allows Unauthorized Password Resets for Any Use

A newly disclosed vulnerability, CVE-2024-6914, has shocked the enterprise software community, affecting a wide...

CISA Alerts on Threat Actors Targeting Commvault Azure App to Steal Secrets

On May 22, 2025, Commvault, a leading enterprise data backup provider, issued an urgent...

PoC Code Published for Linux nftables Security Vulnerability

Security researchers have published proof-of-concept (PoC) exploit code for CVE-2024-26809, a high-severity double-free vulnerability in...