Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerability in Active Directory Services Resolved

Critical Vulnerability in Active Directory Services Resolved

Posted on March 11, 2026 By CWS

A significant security update released on March 10, 2026, addresses a severe flaw within Active Directory Domain Services (AD DS). This vulnerability, identified as CVE-2026-25177, carries a CVSS severity score of 8.8. It provides an opportunity for network-based attackers with existing access to elevate their permissions to full SYSTEM control.

Understanding the Elevation of Privilege Flaw

The vulnerability arises due to improper restrictions on file and resource naming conventions, classified under CWE-641. This flaw can be exploited over the network, requiring minimal privileges and no user intervention, significantly affecting system confidentiality, integrity, and availability.

Exploiting the flaw involves using specially crafted Unicode characters to create duplicate Service Principal Names (SPNs) or User Principal Names (UPNs). These characters can bypass standard security checks designed to prevent such duplicates, allowing attackers to manipulate the system with just basic permission to modify SPNs.

Operational Impact of the Exploit

When a client requests Kerberos authentication for a service with a duplicate SPN, the domain controller incorrectly issues a ticket encrypted with the wrong key. This mismatch can lead to a denial-of-service (DoS) attack or force the system to revert to the less secure NTLM authentication protocol.

Crucially, the attack does not require direct access to the targeted server beyond the initial SPN-write permission. A successful breach can grant attackers full SYSTEM privileges, allowing them to seize control of both the server and the broader domain environment.

Response and Protective Measures

Fortunately, Microsoft currently rates the likelihood of exploitation as low, with no known public exploit code or active attacks reported. However, Microsoft and Semperis have collaborated to release security updates, urging network administrators to apply these patches immediately to secure their systems.

The updates are applicable across a variety of operating systems, including Windows 10, Windows 11, and various Windows Server versions from 2012 to the latest 2025 releases. Administrators are also advised to monitor Active Directory environments for unusual SPN modifications as a proactive defense strategy.

For ongoing cybersecurity news and updates, follow us on Google News, LinkedIn, and X. Contact us if you have a story to share.

Cyber Security News Tags:Active Directory, CVE-2026-25177, Cybersecurity, elevation of privilege, Kerberos, Microsoft, network security, NTLM, security update, Vulnerability

Post navigation

Previous Post: Insights from CISO Aimee Cardwell’s Career Journey
Next Post: Critical n8n Vulnerabilities Risk Remote Code Execution

Related Posts

Top 10 Best Exposure Management Tools In 2026 Top 10 Best Exposure Management Tools In 2026 Cyber Security News
WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities Cyber Security News
North Korean Hackers Evade UN Sanctions Leveraging Cyber Capabilities, IT Workers and Crypto Activities North Korean Hackers Evade UN Sanctions Leveraging Cyber Capabilities, IT Workers and Crypto Activities Cyber Security News
WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs Cyber Security News
Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data Cyber Security News
Odyssey Stealer Escalates Threats to macOS Users Odyssey Stealer Escalates Threats to macOS Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Rolls Out Emergency Chrome Update to Patch Zero-Days
  • Global Crackdown Dismantles SocksEscort Proxy Botnet Network
  • Veeam Fixes Critical Flaws in Backup Software
  • Critical OpenSSH GSSAPI Flaw Threatens Linux Servers
  • CrackArmor Flaws Expose Millions of Linux Servers to Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Rolls Out Emergency Chrome Update to Patch Zero-Days
  • Global Crackdown Dismantles SocksEscort Proxy Botnet Network
  • Veeam Fixes Critical Flaws in Backup Software
  • Critical OpenSSH GSSAPI Flaw Threatens Linux Servers
  • CrackArmor Flaws Expose Millions of Linux Servers to Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News