logo

Select Sidearea

Populate the sidearea with useful widgets. It’s simple to add images, categories, latest post, social media icon links, tag clouds, and more.
hello@youremail.com
+1234567890

BadSuccessor: Default Privilege Risk in Server 2025

BadSuccessor: Default Privilege Risk in Server 2025

The Default Privilege Escalation in Windows Server 2025 You Should Be Scared Of

Imagine giving someone the keys to your house just because they said they were the new owner. That’s essentially what Windows Server 2025 is doing — and it’s called BadSuccessor.

Summary

BadSuccessor is a newly discovered privilege escalation vulnerability in Windows Server 2025 that allows attackers to fully impersonate any Active Directory user — including Domain Admins — without modifying the original account. It exploits a misdesign in the dMSA (delegated Managed Service Account) feature and works in default configurations.

Impact: Total domain compromise
Complexity: Low
Affected: Likely most orgs (91% in tested environments)
Patch: Not yet available

Where It All Began: dMSA and the Idea of Migration

Windows Server 2025 introduced delegated Managed Service Accounts to ease migration pains. When a dMSA replaces a legacy service account, it should inherit everything — permissions, SPNs, delegations, group memberships — to act like a seamless successor.

This inheritance relies on one key attribute:
msDS-ManagedAccountPrecededByLink

When this attribute is set, the KDC (Key Distribution Center) blindly assumes the dMSA is the rightful successor and issues Privilege Attribute Certificates (PACs) containing all the original account’s rights — no verification needed.

Where It All Began: dMSA and the Idea of Migration

Attackers don’t need to perform a real migration. They can simulate one by setting two attributes:

1. msDS-ManagedAccountPrecededByLink → DN of target user (e.g. Administrator)
2. msDS-DelegatedMSAState → 2 (signals migration is complete)

From that point forward, when the dMSA authenticates, it receives a PAC with the target’s SID and group memberships, effectively impersonating them on the network.

Real-World Abuse: From Unprivileged to Domain Admin

There are two main paths an attacker might take:

1. Hijack an existing dMSA
– Modify msDS-ManagedAccountPrecededByLink to point to a privileged user
– Set msDS-DelegatedMSAState to 2
– Authenticate as the dMSA and assume all target privileges

2. Create a new dMSA
– If a user has create permissions on any OU, they can:
• Use PowerShell to create a dMSA in that OU
• Gain full control over it
• Configure the two attributes
• Request a TGT for the dMSA using tools like Rubeus

Boom: The attacker becomes a Domain Admin, with no touch to the original account.

What Makes BadSuccessor So Dangerous?

  • No access required to the target user account
  • No LDAP writes to the target user
  • No group membership changes
  • No logs indicating a privilege escalation

The exploit lives entirely in the dMSA object. As long as the KDC sees the msDS-ManagedAccountPrecededByLink, it delivers a PAC with all inherited rights.

Bonus: Credential Leakage

There’s more.

When a TGT is issued to a dMSA, it contains a structure called KERB-DMSA-KEY-PACKAGE, which includes:
– current-keys
– previous-keys

Surprisingly, the previous-keys can sometimes contain the RC4 key of the impersonated account — which means that the attacker might also recover the NTLM hash of the target account.

They get your permissions AND your password hash.

What You Can Do

Until Microsoft ships a patch, you are responsible for mitigating this risk. Here are immediate steps you should take:

Audit:
– Search your domain for any dMSAs (objectClass=msDS-GroupManagedServiceAccount)
– Check which users/groups have write access to dMSAs
– Monitor changes to msDS-ManagedAccountPrecededByLink and msDS-DelegatedMSAState

Restrict:
– Limit creation of dMSAs to trusted admin OUs only
– Avoid delegating Create all child objects or Create msDS-DelegatedManagedServiceAccount to untrusted users
– Deny WriteProperty on msDS-ManagedAccountPrecededByLink where possible

Detect:
– Look for anomalous PACs with mismatched SIDs during logon
– Monitor TGT requests for dMSAs and unexpected group memberships
– Use tools like Wireshark or Rubeus to inspect PACs when necessary

What You Can Do

BadSuccessor is a perfect example of how convenience can backfire when security isn’t baked into the design. The assumption that a migration must be legitimate — without validation — opened the door for one of the most stealthy and devastating privilege escalation attacks in recent memory.

If you manage an AD environment — especially one testing or planning for Windows Server 2025 — this should be at the top of your priority list.

Sean Gray
Sean Gray, CPTS, CBBH, CEH, CRTO, CompTIA: Pentest+, CySA+, CSAP, Linux+, Security+, Network+

Sean is an experienced cybersecurity professional specializing in offensive security, red teaming, and penetration testing. Prior to joining CyberAssurance, Sean spent 10 years as a contractor with the U.S. Department of State, where he held roles ranging from Service Desk Shift Lead to Senior Penetration Tester. Most recently, Sean served as a Subject Matter Expert Penetration Tester within the Bureau of Diplomatic Security’s Red Cell, part of the Directorate of Cyber Technology and Security. In this role, he led advanced penetration tests simulating adversarial tactics used by nation-state threat actors targeting U.S. government systems. Sean has deep expertise in external and internal network penetration testing, web application assessments, phishing campaigns, Active Directory security, and custom exploit development. His hands-on experience and adversary-focused approach help organizations strengthen their defenses through realistic, high-impact testing.

No Comments

Sorry, the comment form is closed at this time.