New Attack Uses Ghost SPNs and Kerberos Reflection to Escalate Privileges on SMB Servers

New Attack Uses Ghost SPNs and Kerberos Reflection to Escalate Privileges on SMB Servers
New Attack Uses Ghost SPNs and Kerberos Reflection to Escalate Privileges on SMB Servers
A sophisticated privilege escalation vulnerability in Windows SMB servers has been discovered, leveraging Ghost Service Principal Names (SPNs) and Kerberos authentication reflection to achieve remote SYSTEM-level access.

Microsoft designated this as CVE-2025-58726, an “SMB Server Elevation of Privilege” flaw impacting all Windows versions absent enforced SMB signing.

According to Semperis, the issue persists in environments with default Active Directory (AD) configurations, underscoring Kerberos’ susceptibility to reflection despite mitigations for related flaws like CVE-2025-33073.

Technical Exploitation Mechanics

The vulnerability exploits the interplay between unresolved SPNs and permissive DNS registration protocols in Windows domain environments.

Domain users, by default, hold write access to DNS zones, enabling attackers to hijack ghost SPN entries referencing non-resolvable hostnames from legacy systems, deployment errors, or hybrid setups.

This facilitates Kerberos ticket relaying, bypassing credential requirements and granting administrative control, with escalation to domain dominance if Tier 0 assets like AD Certificate Services are compromised.

Kerberos authentication, integral to Windows domains, employs asymmetric tickets for secure service access but lacks inherent reflection safeguards, unlike NTLM’s channel-binding mitigations.

Authentication reflection entails capturing a victim’s Kerberos AP-REQ (Application Request) and replaying it to the victim’s own endpoint, coercing self-authentication.

In CVE-2025-58726, ghost SPNs prefixed with HOST/ or CIFS/ on target computer accounts serve as the pivot point.

Attackers query AD for SPNs via LDAP, identify unresolved ones through nslookup failures, and register a DNS A-record mapping the ghost hostname to their controlled IP, exploiting domain users’ default dnsHost permissions.

Coercion follows using tools like PrinterBug or PetitPotam to trigger the target’s machine account to request a TGS ticket for the ghost SPN.

A relay tool such as KrbRelayEx intercepts the AP-REQ during SMB session setup, extracts the Kerberos token via SSPI, and relays it to the target’s SMB server, enabling arbitrary execution with SYSTEM privileges.

Microsoft’s Security Response and Remediation

Disclosed to the Microsoft Security Response Center (MSRC) on June 25, 2025, and confirmed as “Important” severity by July 22, CVE-2025-58726 received patches in Microsoft’s October 14 security update.

The remediation targets the srv2.sys driver, governing SMB 2.0+ server logic, integrating validation mechanisms to verify SPN legitimacy against local security contexts and assess source IP addresses to block remote reflection attempts.

Microsoft’s patch addresses the core issue by terminating sessions pre-token impersonation when detecting anomalous connection patterns.

However, residual risks linger for unpatched or multi-protocol setups. Organizations should enforce SMB signing via Group Policy by setting RequireSecuritySignature=1 on clients and servers, audit SPNs with tools like TestComputerSpnDNS to enumerate and purge ghosts using setspn -D commands, and revoke domain users’ DNS write ACLs via dnscmd /config.

Additional protective measures include deploying Kerberos monitoring for anomalous TGS-REQs through ETW or Wireshark filters on port 88, and neutralizing coercion via RPC restrictions such as DisableUnencryptedRpc=1 and service hardening.

ywAAAAAAQABAAACAUwAOw==

The October 14 patch rollout emphasizes proactive AD hygiene, as ghost SPNs proliferate in 70% of audited environments per industry reports.

As attackers refine relay chains, integrating these controls fortifies defenses against evolving Kerberos abuses.

CVE-2025-58726 Technical Details

AttributeDetails
CVE IDCVE-2025-58726
Vulnerability TypeSMB Server Elevation of Privilege
SeverityImportant
CVSS ScoreNot specified
Affected ProductsWindows SMB servers (all versions without enforced SMB signing)
Attack VectorNetwork
Attack ComplexityMedium
Privileges RequiredLow (domain user access)
User InteractionNone
ImpactRemote SYSTEM-level access, potential domain compromise
Prerequisites– Low-privilege domain access
– Domain-joined target without SMB signing
– Ghost SPN present on target
– Default DNS write permissions
Disclosure DateJune 25, 2025
Patch DateOctober 14, 2025
Exploit MechanismGhost SPN hijacking + Kerberos authentication reflection
Mitigation– Apply October 2025 patch
– Enforce SMB signing
– Audit and remove ghost SPNs
– Restrict DNS write permissions
– Deploy RPC restrictions

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

The post New Attack Uses Ghost SPNs and Kerberos Reflection to Escalate Privileges on SMB Servers appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading