• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

Why You Should Patch These Two New Active Directory Bugs

Microsoft is urging Active Directory administrators to apply November patches for a pair of tricky domain service privilege escalation bugs.

December 21, 2021 Zachary Comeau Leave a Comment

Active Directory Bugs
stock.adobe.com/monticellllo

Microsoft is urging Active Directory administrators to apply November patches for a pair of tricky domain service privilege escalation vulnerabilities after a proof-of-concept tool leveraging them was publicly disclosed.

According to the company, an attacker can combine the two bugs (CVE-2021-42287 and CVE-2021-42278) to “create a straightforward path to a Domain Admin user in an Active Directory (AD) environment” that has not yet applied the updates.

That escalation attack gives hackers the ability to elevate their privilege to that of a Domain Admin once they compromise a regular user in the domain, the tech giant says.

CVE-2021-42278: SAM Name Impersonation

According to Microsoft, this bug allows attackers to impersonate a domain controller using computer account sAMAccountName spoofing.

Internally, Active Directory uses several naming schemes for a given object, such as userPrincipalName (UPN), and sAMAccountName (SAM-Account).

To find this in Active Directory Users and Computers, click “view,” navigate to “advanced features” and open the properties of an object. Then, click the “Attribute Editor” tab and scroll down to sAMAccountName.

For computers, those name attributes usually end with “$” to help distinguish between user objects and computer objects. However, there are no restrictions or validations for changing that attribute to include or not include the “$”.

“With default settings, when the relevant patch is not applied, a normal user has permission to modify a machine account (up to 10 machines) and as its owner, they also have the permissions to edit its sAMAccountName attribute,” Microsoft says.

CVE-2021-42287 – KDC bamboozling

This is a bug that allows a potential attacker to impersonate the domain controllers directory. When combined with the one discussed above, an attacker with domain credentials can leverage them for granting access as a domain admin user.

According to Microsoft, “When performing an authentication using Kerberos, Ticket-Granting-Ticket (TGT) and the following Ticket-Granting-Service (TGS) are being requested from the Key Distribution Center (KDC). In case a TGS was requested for an account that could not be found, the KDC will attempt to search it again with a trailing $.”

This allows an attacker can take a domain controller with a SAM account name of DC1$, create a new machine account and rename its SAM account name to DC1, request a TGT, give it a different name and request a TGS ticket while presenting the given TGT.

“When processing the TGS request, the KDC will fail its lookup for the requestor machine DC1 the attacker had created. Therefore, The KDC will perform another lookup appending a trailing $. The lookup will succeed. As a result, the KDC will issue the ticket using the privileges of DC1$.”

Microsoft also released a step-by-step guide to identify potential compromised computers via Microsoft 365 Defenders’ Advanced Hunting feature:

The sAMAccountName change is based on event 4662. Please make sure to enable it on the domain controller to catch such activities. Learn more of how to do it here.

  • Open Microsoft 365 Defender and navigate to Advanced Hunting.
  • Copy the following query (which is also available in the Microsoft 365 Defender GitHub Advanced Hunting query):

IdentityDirectoryEvents

| where Timestamp > ago(1d)

| where ActionType == “SAM Account Name changed”

| extend FROMSAM = parse_json(AdditionalFields)[‘FROM SAM Account Name’]

| extend TOSAM = parse_json(AdditionalFields)[‘TO SAM Account Name’]

| where (FROMSAM has “$” and TOSAM !has “$”)

or TOSAM in (“DC1”, “DC2”, “DC3”, “DC4”) // DC Names in the org

| project Timestamp, Application, ActionType, TargetDeviceName, FROMSAM, TOSAM, ReportId, AdditionalFields

  • Replace the marked area with the naming convention of your domain controllers
  • Run the query and analyze the results which contains the affected devices. You can use Windows Event 4741to find the creator of these machines, if they were newly created
  • We recommend investigating these compromised computersand determine that they haven’t been weaponized.
  • Make sure to update the devices with the following KBs: KB5008102, KB5008380, KB5008602

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Active Directory, Cybersecurity, Patch management, Vulnerabilities

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.