Categories: Cyber Security News

SharpSuccessor: PoC for Exploiting BadSuccessor Vulnerability in Windows Server 2025

A proof-of-concept exploit tool called SharpSuccessor that weaponizes the recently discovered BadSuccessor vulnerability in Windows Server 2025’s delegated Managed Service Account (dMSA) feature. 

The .NET-based tool, developed by Logan Goins, demonstrates how attackers with minimal Active Directory permissions can escalate privileges to the domain administrator level, raising serious concerns about the unpatched vulnerability affecting enterprise environments worldwide.

Exploiting dMSA Architecture

The BadSuccessor vulnerability, initially discovered by Akamai researcher Yuval Gordon, exploits the dMSA migration mechanism by manipulating two critical attributes: msDS-ManagedAccountPrecededByLink and msDS-DelegatedMSAState. 

SharpSuccessor automates this attack vector by creating a malicious dMSA object and setting it to impersonate any target account, including highly privileged Domain Administrator accounts.

The tool requires only CreateChild permissions over any Organizational Unit (OU) in the Active Directory domain to function. 

Attackers can execute the initial payload using the command: SharpSuccessor.exe add /impersonate:Administrator /path:”ou=test,dc=lab,dc=lan” /account:jdoe /name:attacker_dMSA. 

This command creates a weaponized dMSA that inherits all permissions from the targeted account without requiring direct access to the original user object.

Multi-Stage Kerberos Authentication Chain

SharpSuccessor implements a sophisticated multi-stage attack chain leveraging Kerberos authentication protocols. 

After creating the malicious dMSA, attackers must first obtain a Ticket Granting Ticket (TGT) using Rubeus with the command Rubeus.exe tgtdeleg /nowrap. This initial authentication establishes the foundation for subsequent privilege escalation.

The second stage involves impersonating the dMSA account through the command Rubeus.exe asktgs /targetuser:attacker_dmsa$ /service:krbtgt/lab.lan /opsec /dmsa /nowrap /ptt /ticket:[base64_ticket]. 

This operation grants the attacker a service ticket with the target user’s privileges, effectively bypassing traditional Active Directory security controls. 

The final step enables access to domain controllers using Rubeus.exe asktgs /user:attacker_dmsa$ /service:cifs/[DC_FQDN] /opsec /dmsa /nowrap /ptt, providing SMB access for post-exploitation activities.

Research indicates that 91% of examined Active Directory environments contain non-administrative users with sufficient permissions to execute the BadSuccessor attack. 

This extensive exposure stems from the vulnerability’s reliance on commonly granted OU permissions rather than high-privilege account access. 

The attack remains viable even in environments not actively using dMSAs, provided at least one Windows Server 2025 domain controller exists in the domain.

Microsoft has acknowledged the vulnerability but classified it as “moderate severity,” determining it does not meet the threshold for immediate patching. 

This decision leaves organizations vulnerable until an official fix becomes available. Security experts recommend implementing Akamai’s detection script Get-BadSuccessorOUPermissions.ps to identify at-risk organizational units and restricting dMSA creation permissions to trusted administrators only.

The release of SharpSuccessor underscores the critical need for proactive security measures, as the tool transforms a complex privilege escalation technique into an easily deployable attack vector accessible to less sophisticated threat actors.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

The post SharpSuccessor: PoC for Exploiting BadSuccessor Vulnerability in Windows Server 2025 appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Dragon Ball Super: Beerus Trailer Teases the Resurrection of Frieza

A new trailer for Dragon Ball Super: Beerus has arrived, teasing a look at not…

2 hours ago

Dragon Ball Xenoverse 3 Announced for PC and Consoles in First Trailer

Bandai Namco has announced Dragon Ball Xenoverse 3 for PC via Steam, PlayStation 5, and…

2 hours ago

Tammy Fogle outlines vision for Abilene City Council Place 4 race

ABILENE, Texas (KTAB/KRBC) – Abilene City Council Place 4 candidate Tammy Fogle is sharing her…

3 hours ago

The Best Deals Today: Apple AirTag 4-Pack, 3 for $33 Movie Deal, Sony WH-1000XM5 Headphones, and More

A new weekend has arrived, and today, you can save big on Apple AirTags, 4K…

4 hours ago

Avengers: Endgame Re-Release Footage is ‘Critical’ to the Plot of Doomsday

Director Joe Russo has confirmed the upcoming Avengers: Endgame re-release will include new footage that…

5 hours ago

Windrose Celebrates 1 Million Copies Sold as Player Counts Climb

Cooperative pirate survival game Windrose has reached 1 million copies sold less than a week…

6 hours ago

This website uses cookies.