Microsoft has patched a critical Active Directory Domain Services (AD DS) vulnerability (CVE‑2026‑25177)
Microsoft has patched a critical Active Directory Domain Services (AD DS) vulnerability (CVE‑2026‑25177) that allows attackers with minimal privileges to escalate to full SYSTEM access. The flaw, rated 8.8 CVSS, affects Windows Server environments and was fixed in the March 2026 Patch Tuesday update. How the Exploit Works Unicode manipulation : Attackers use hidden Unicode characters to create duplicate SPNs or UPNs . Kerberos confusion : When a client requests a Kerberos ticket for a duplicate SPN, the domain controller issues a ticket encrypted with the wrong key. Fallback risk : This can trigger NTLM fallback (if enabled) or cause denial-of-service . Privilege escalation : With SPN write access, attackers can escalate to SYSTEM without touching the target server directly. Affected Systems Windows Server 2012 → Server 2025 Windows 10 and 11 (if acting as domain controllers) Any AD DS deployment with Kerberos and NTLM enabled Security Implications Domain-wide compro...