A critical security vulnerability in Windows Server 2025, known as BadSuccessor, allows attackers to gain control over any Active Directory user account.
This vulnerability exploits the delegated Managed Service Account (dMSA) feature and can lead to complete domain control by attackers.
Security professionals can detect BadSuccessor attacks using detection rules available on the SOC Prime Platform with AI-powered detection engineering and threat hunting capabilities.
The BadSuccessor vulnerability poses a significant threat to Active Directory environments and could enable lateral movement and devastating attacks like ransomware.
Exploiting dMSAs in Windows Server 2025 allows attackers to escalate privileges and gain control over high-privilege accounts, such as Domain Admins.
The vulnerability impacts a wide range of AD-dependent organizations, with 91% of environments analyzed found to be susceptible.
By manipulating dMSAs, attackers can exploit the BadSuccessor vulnerability to take over an entire domain without traditional administrative restrictions.
Despite Microsoft's acknowledgment of the issue, there is currently no official patch available for BadSuccessor, emphasizing the need for organizations to restrict dMSA creation rights and tighten permissions.
To mitigate risks, Akamai has provided a PowerShell script on GitHub to identify users with dMSA creation rights.
Organizations are advised to leverage the SOC Prime Platform for comprehensive threat detection and mitigation against BadSuccessor and other emerging cyber threats.