Detecting and securing vulnerabilities in Active Directory Certificate Services (2024)

Detecting and securing vulnerabilities in Active Directory Certificate Services (1)

Establishing a secure channel for communication is an idea that dates back more than 100 years. Today, secure methods of data transfer are integrated into most technologies so deeply that the greater public has no idea how it works. A Public Key Infrastructure (PKI) is one of the primary methods for establishing a secure communication channel. A PKI is a framework that uses digital keys and certificates to assist in securing communication and verifying identities.

In this post, we will break down Microsoft’s implementation of a Public Key Infrastructure – Active Directory Certificate Services – and what you need to know about detecting and securing common vulnerabilities found in this important communication and authentication service.

What is Active Directory Certificate Services?

Active Directory Certificate Services (AD CS) is one of the server roles Microsoft introduced in Windows Server 2008 that enables even the smallest enterprises with the ability to issue and manage PKI certificates. At its core, Active Directory Certificate Services consists of a certificate authority (CA). A CA is in charge of signing and issuing certificates to objects in Active Directory (AD). A successful PKI is built on trust. When a CA signs a certificate, it provides its stamp of approval. Any entity that trusts that CA can therefore be certain of the certificate’s authenticity. That is, unless the CA has been compromised.

In the last few years, there has been an uptick of attacks targeting Active Directory Certificate Services. These attacks leverage misconfigurations that allow for privilege escalation that may result in full AD compromise. Do not fear, it isn’t time to pull the plug on your certificate authority. AD CS can be hardened to withstand attacks and service your enterprise in a secure method.

Requirements and use cases for Active Directory Certificate Services

Active Directory Certificate Services does not require a Microsoft license beyond what’s needed to run the Server Operating System (OS). AD CS is simply a Windows Server role that can be added through the Server Manager Dashboard. The AD CS Role consists of multiple different service offerings. The previously mentioned CA is the first of these services and is often synonymous with AD CS itself. Additional services include web enrollment, policy-based certificate enrollment, and even TPM key attestation.

Enterprises may utilize AD CS to issue certificates to internal services such as intranet sites, email, code signing, encrypting file systems, smart card authentication, etc. Many third-party services offer integration options for a managed PKI. Hypervisors such as VMware ESXi allow for integrations that create a subordinate (child) CA that issues certificates on behalf of your AD CS infrastructure. Virtual Private Network (VPN) and wireless vendors offer similar integrations. These integrations must be carefully configured so as not to create vulnerabilities. Regardless of whether you’re looking to deploy a new PKI using AD CS or if you just found out you have one, there are a number of security risks to be aware of.

Common AD CS security risks

The security risks associated with AD CS can be primarily attributed to dangerous defaults and misconfigurations. Before digging into these risks, it’s important to understand how attackers are using certificates to attack AD.

Put simply, AD uses the Kerberos protocol for authenticating users. AD can use certificates issued by its own CA to secure the Kerberos authentication process. Given the right configuration, an attacker can leverage these Kerberos tickets to authenticate to AD without needing to know account passwords. Will Schroeder and Lee Christensen authored what has become the authority on abusing AD CS. You can check out more specifics of these attack strategies here.

Template settings and permissions

The majority of Active Directory Certificate Services problems stem from dangerous CA template settings and permissions on those templates. Typically, users are only able to request certificates for themselves. However, a common certificate template misconfiguration allows for users to request certificates on behalf of any other user including administrators. This configuration is present when the subject name can be supplied in the certificate request.

Detecting and securing vulnerabilities in Active Directory Certificate Services (2)

Given a certificate in the name of an administrator, an attacker is able to request a Kerberos ticket and authenticate to AD as the administrative account. Extrapolating this problem, if users are able to make modifications to certificate templates, then these dangerous configurations can be applied to any template and exploited using the same method described above.

Default settings and misconfigurations

Beyond certificate templates, there are two common misconfigurations related to AD CS itself. These misconfigurations are default settings when installing AD CS. The first is utilizing a single-tier infrastructure. Microsoft recommends implementing a multi-tier deployment, which includes building multiple servers and maintaining an offline root CA. Deploying a multi-tier infrastructure with an offline root CA creates a more secure environment that protects the integrity of the service. Should a subordinate CA become compromised it can be more easily replaced than that of a root CA. Microsoft provides more information regarding this best practice in their documentation.

Detecting and securing vulnerabilities in Active Directory Certificate Services (3)

Reduce your AD attack surface.

See where you’re exposed and how to remediate it.

Try Security Guardian

The second dangerous default is the lack of auditing. Beyond constantly scanning and fixing dangerous misconfigurations, the only method of detecting threats lies within the built-in AD CS auditing. Unfortunately, many sysadmins don’t even know these exist, as during the GUI installation of a CA, there are no options to enable auditing. This configuration is accomplished on the CA servers after certificate services are installed. Microsoft explains that auditing can be configured through the CA snap-in GUI or on the command line using certutil.

Detecting misconfigurations and securing Active Directory Certificate Services

With so many opportunities to fail, there is still hope. Schroeder and Christensen released PSPKIAudit two years ago to assist in the detection of these issues. Since then, Jake Hildreth has been performing consistent updates to his tool, Locksmith. These tools are both freely available to the community.

The power of Locksmith really shines on the flexibility it offers when detecting and remediating AD CS misconfigurations. You heard it right this tool will remediate AD CS issues. Running Locksmith with “mode 1” will output all detected vulnerabilities as well as the corresponding code to fix each item. There are also fully automated options, but this method should be safe to run in any environment.

Detecting and securing vulnerabilities in Active Directory Certificate Services (4)

Conclusion

Active Directory Certificate Services is a valuable tool in most enterprises. Its integrations with AD and other products provide valuable benefits requested of a PKI. However, it comes with the trade-off of leaving AD potentially vulnerable. Luckily, the misconfigurations associated with AD CS are easily identified and mitigated. These security risks must be continually detected and monitored to maintain a healthy AD CS infrastructure. As a spider once said, with great power comes great responsibility.

Nine best practices to improve Active Directory security and cyber resilience

Active Directory (AD) is a prime target for attackers because of its importance in authentication and authorization. Learn best practices for defending your organization.

Download Now

Detecting and securing vulnerabilities in Active Directory Certificate Services (2024)
Top Articles
What is Equity - Types, Features, Advantages, Formula
Is Rust Set to Replace C++ in the Future?
Bbwcumdreams
Mid America Irish Dance Voy
‘White Horse’ by Chris Stapleton - Lyrics & Meaning | Holler
Craigslist Parsippany Nj Rooms For Rent
Seat Number Usana Seating Chart With Rows
Ffxi Nasomi
Huntsville Body Rubs
LIVE UPDATES: South Shore Week 3 high school football scores and highlights
Rumsey Yost Funeral Home Obituaries
Xlauriexkimx
Seo Glossary definition page
Raley Scrubs - Midtown
Purdue Timeforge
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Quick Links for Qtrac Login
Bingo Bling Promo Code 2023
Peoria | Illinois, Map, Population, & History
Accident Randall Road Today
Lowes Springhurst
Sam's Club Gas Price Mechanicsburg Pa
Goddess Iah K
12 Silent Manga Omnibus
On the hunt for an apartment? Try these 9 Craigslist alternatives
Walmart Tire And Lube Center Near Me
Unveiling The "Little Princess Poppy Only Fans Leak": Discoveries And Insights Revealed
Domino's Pizza Mt Prospect
Craigslist Snowblower
Labor Gigs On Craigslist
How do I beat the frog in level 532?
Lions Roster Wiki
Airsculpt Roseville Photos
2013 Chevy Cruze Cooling System Diagram
Bòlèt Florida Midi
History of Lewiston | Lewiston, ME
Livvy Dunne Leaked: Everything You Need to Know - Women The Magazine
Bigtechoro: Latest Business, Technology, Education, News & Updates
Teradata Rename Table
Myhr Pepsico Login
Mythical Horses (Tier 10) - BDFoundry
211475039
Bofa Drive Thru Near Me
Lowes.com Usa
Neos Urgent Care Springfield Ma
Sams Manage Credit Card
Wow Irontree Branch
10 Competências da SMMA de Foz do Iguaçu - material14832 - Legislação
Craigslist St. Paul
Shaw University Football Roster
Latest Posts
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 5610

Rating: 4.2 / 5 (43 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.