Kerberos KDC Security Feature Bypass Vulnerability
Released: 10 de nov. de 2020
Last updated: 13 de jul. de 2021
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2020-17049
- Impact
- Security Feature Bypass
- Max Severity
- Important
- CVSS Source
- Microsoft
- Vector String
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Metrics
- CVSS:3.1 6.6 / 5.8Base score metrics: 6.6 / Temporal score metrics: 5.8
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Exploit Code Maturity
Unproven
Remediation Level
Official Fix
Report Confidence
Confirmed
Please see Common Vulnerability Scoring System for more information on the definition of these metrics.
Executive Summary
A security feature bypass vulnerability exists in the way Key Distribution Center (KDC) determines if a service ticket can be used for delegation via Kerberos Constrained Delegation (KCD).
To exploit the vulnerability, a compromised service that is configured to use KCD could tamper with a service ticket that is not valid for delegation to force the KDC to accept it.
The update addresses this vulnerability by changing how the KDC validates service tickets used with KCD.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation Less Likely
FAQ
Do I need to take further steps to be protected from this vulnerability?
Yes. As of April 13, 2021, customers who have already installed the November 10, 2020 security updates need to do the following:
- This update assumes that all Domain Controllers are updated with the December 8, 2020 updates or later updates. The December 8, 2020 security updates include fixes for all known issues originally introduced by the November 10, 2020 release of CVE-2020-17049. This update also adds support for Windows Server 2008 SP2 and Windows Server 2008 R2.
- Install the updates released on April 13, 2021. These updates remove the PerformTicketSignature setting 0. Setting PerformTicketSignature to 0 after this update is installed will have the same effect as setting PerformTicketSignature to 1. The Domain Controllers (DC)s will be in Deployment mode.
For more information and further steps to enable full protection on domain controller servers see Managing deployment of Kerberos S4U changes for CVE-2020-17049.
Acknowledgements
- Jake Karnes of NetSPI
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- 10.0.19041.1110
- 6.3.9600.20069
- 6.3.9600.20069
- 6.3.9600.20069
- 6.3.9600.20069
- 6.2.9200.23409
- 6.2.9200.23409
- 6.2.9200.23409
- 6.2.9200.23409
- 6.1.7601.25661
- 6.1.7601.25661
- 6.1.7601.25661
- 6.1.7601.25661
- 6.0.6003.21167
- 6.0.6003.21167
- 6.0.6003.21167
- 6.0.6003.21167
- 6.0.6003.21167
- 6.0.6003.21167
- 6.0.6003.21167
- 6.0.6003.21167
- 10.0.14393.4530
- 10.0.14393.4530
- 10.0.19041.1110
- -
- -
- 10.0.17763.2061
- 10.0.17763.2061
Disclaimer
Revisions
Microsoft is releasing security updates to deploy the enforcement phase for this vulnerability. Active Directory domain controllers are now capable of Enforcement mode. Going to Enforcement mode requires that all Active Directory domain controllers have the December 8, 2020 update or a later Windows update installed. At this time, the PerformTicketSignature registry key settings will be ignored and Enforcement mode cannot be overridden. See the FAQ section of this CVE and KB4598347 for more information.
Microsoft is releasing security updates for the second deployment phase for this vulnerability. These updates remove the PerformTicketSignature setting 0. Setting PerformTicketSignature to 0 after this update is installed will have the same effect as setting PerformTicketSignature to 1. The Domain Controllers (DC)s will be in Deployment mode. See the FAQ section of this CVE and KB4598347 for more information.
To comprehensively address CVE-2020-17049, Microsoft has released the following: December 2020 Security Updates for all affected Windows 10 servers, Windows Server 2012 R2, and Windows Server 2012; December 2020 Monthly Rollup updates and Security Only updates for all affected versions of Windows Server 2008 R2 and Windows Server 2008. These updates include fixes for all known issues originally introduced by the November 10, 2020 security updates for CVE-2020-17049. Microsoft strongly recommends that customers running any of these versions of Windows Server install the updates and then follow the steps outlined in https://support.microsoft.com/help/4598347 to enable full protection on domain controller servers.
In the Security Updates table, corrected the Download and Article links for all affected Windows 10 servers, Windows Server 2012 R2, and Windows Server 2012 R2. Note that the December 2020 Security Updates supercede the security updates released on November 10, 2020 and the updates released between November 17, 2020 and November 19, 2020 to address this vulnerability.
Added information to the FAQ regarding a non-security update to address a known issue for Domain Controllers (DC) Servers.
To address a known issue with the Kdc registry subkey settings, Microsoft has revised the guidance for deploying this update. Please see the FAQ section for updated information.
Added an Executive Summary and updated the FAQs to further clarify the information for this CVE. This is an informational change only.
Information published.