SecTor 2025 | The (Un)Rightful Heir: My dMSA Is Your New Domain Admin
Why It Matters
The vulnerability lets attackers turn a low‑privilege DMSA into a domain admin, threatening the entire Active Directory trust model.
Key Takeaways
- •DMSA migration copies legacy account privileges via ticket merging.
- •Attackers can forge migration links to elevate privileges within Active Directory.
- •"Bed successor" technique exploits DMSA attribute manipulation to gain.
- •Patch mitigates pre‑patch exploit but post‑patch still viable.
- •Organizations must restrict OU access to prevent DMSA abuse.
Summary
The SecTor 2025 talk unveiled a critical Active Directory flaw tied to the newly introduced Delegated Managed Service Account (DMSA). The speaker, Yval Gordon, walked through the DMSA migration workflow—linking a legacy service account, granting temporary authentication rights, and finally superseding the old account—highlighting how the domain controller merges privilege data during ticket issuance.
Key insights include the discovery that the DC copies the legacy account’s group memberships into the DMSA’s Kerberos ticket (the “pack”), effectively granting identical privileges without explicit group assignment. By manipulating the migration attributes, an attacker can fabricate a link between a compromised DMSA and any high‑privilege account, a technique the presenter dubbed “bed successor.” Microsoft’s pre‑patch fix addressed the initial vector, yet the post‑patch scenario still allows privilege escalation if the attacker controls an OU‑based DMSA.
The presenter demonstrated the attack flow: create or hijack a DMSA, alter its linking attributes to point at a domain admin account, trigger authentication, and receive a ticket that inherits the admin’s rights. He emphasized that DMSAs placed in standard OUs are far easier to compromise than those in the restricted Managed Service Account container, making OU permissions a critical attack surface.
Implications are profound: organizations that have begun adopting DMSAs for seamless migration may inadvertently expose a path to domain‑wide compromise. Immediate mitigations include applying Microsoft’s patches, auditing DMSA placements, tightening OU delegation, and monitoring for anomalous migration commands. Failure to act could enable attackers to obtain domain admin privileges with minimal foothold.
Comments
Want to join the conversation?
Loading comments...