Podcast
Root Causes 236: Active Directory Patch Knocks Out Non-MS Identity Consumers


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
August 4, 2022
A recently revealed vulnerability in Active Directory made it possible for an attacker to escalate privileges inappropriately. Microsoft's responded with a patch in May 2022, which unfortunately has forced a difficult workaround for many common software components beyond Active Directory that will otherwise be incapable of working with AD identities. In this episode we explain what his happening, how it came about, and the broader lessons for PKI owners.
Podcast Transcript
Lightly edited for flow and brevity.
Let’s get into a little bit. So, let’s start with an old story, which is for those of you who have ever used Active Directory before, which is probably most of you, I hope, or if any of you come from a traditional enterprise environment, you’ve probably dealt with it in some way, shape or form. And don’t know if you know this, of course, but if you’ve ever attached yourself to an Active Directory environment, in other words, attached into a domain controller, you can call your computer whatever you want. So in other words, your DNS Host Name, if you want to get technical about it, the chance of collision between computer names in the Active Directory world is high, but nobody really worried about it too much. And certainly, until May 10 of this year, Microsoft made really no attempt within Active Directory to stop the collisions from happening. So, some really smart white hats took a look at this and decided, specifically for systems that where the domain controllers are basically authenticating with certificates and where other computers are authenticating through certificates as well using Active Directory Certificate Services are there certificate profiles such that you can name your computer whatever you want rule and basically then, escalate your privileges from a low privileged computer account up to something that is maybe all the way up to a domain controller, a domain administrator.
Microsoft issued a Patch to fix the Patch and whenever you get into that kind of thing, Tim, you know what that’s like. That’s a snowball of hot patches, warm patches, mild lukewarm patches. It’s just a nightmare. And so, domain controllers themselves, Tim, were being mapped incorrectly, so the Patch for the Patch helped to fix that. So, that’s great. That at least means that your domain controllers can come back online that were authenticating with Active Directory Certificate Services certificates, but then the problem became what about anybody else who was sending their certificates to be used offline. In other words, things that were not essentially attaching to Active Directory, you were just using the certs. Wwe’re talking about offline systems and I’m going to name off a bunch of acronyms, and actually state what acronyms are, and Tim, the reason I’m going to go through this list is I want to show you how extensive these certificates are used in systems that are not necessarily Microsoft stacked technologies or logging into Active Directory and that includes the Network Policy Server, NPS; Routing and Remote Access Service, RRAS; Radius Extensible Authentication Protocol, EAP; you guys probably, anybody using that for logging in through WiFi access points you know about that one. So if you’re using certs for that and the Protected Extensible Authentication Protocol, PEAP which has been around. All of those things can consume Active Directory Certificate Services certificates and not necessarily have a direct mapping between this Object SID, the Security Identifier from Active Directory, and the machine itself. How in the world when you’re using the cert is that OID, what would you map it too. What to you map it to. What do you map it to. So, in other words, Microsoft seems to have completely forgot about PKI used outside of Active Directory. If you really want to put a sentence to it, that’s the sentence.
There’s a ton. There might even be a lot of stuff you don’t know about. What a nightmare to have to reissue certificates. You have to manually figure out, alright well what is my identifier going to be? I have to specifically put the settings for every one of these devices. So, real problem. Ironically, anybody who chose to do Active Directory Certificate Services certificates as part of their authentication scheme, thinking well this is making me more secure. Well, it probably is. The problem is that you’re dealing with a PKI that is so fundamentally ensconced inside of Active Directory. I think that, Tim, if we were to come up with, as you always ask me for, a pithy conclusion, a pithy definition, I think what it comes down to is when you’re choosing your PKI, even though you can pump a cert, ask yourself whether that cert pump, meaning Active Directory Certificate Services, is playing nice with the types of things that you are using your certificates for. In the Microsoft world they are so, so focused on Active Directory that even though they have given their customers ample ways to use those certificates any way they like, you should ask yourself, should you? Should you in the future use those things any way you like? And the answer to that probably is what, if I’m using certificates for non-Microsoft stack technologies I probably should not be using legacy Active Directory Certificate Services.
It is a crazy story, and God bless the people at Microsoft. Good people. Always well intentioned. The thing is, what an oversight. Forgetting that you had usage for your PKI outside of Active Directory. I just have to shake my head because when I finally read through it, that was my conclusion and I just couldn’t believe what I was reading.

