Microsoft has published a reminder today about the upcoming Full Enforcement phase of Windows Netlogon and Kerberos hardening next month. The changes will be deployed via the October 2023 Patch Tuesday which will be released on 10th of October. The full timeline is available in this dedicated article.
The deployment phase ended back in June and a month later in July, via the monthly Patch Tuesday, the initial Enforcement Phase was released:
The Windows updates released on or after July 11, 2023 will do the following:
- Removes the ability to set value 1 for the KrbtgtFullPacSignature subkey.
- Moves the update to Enforcement mode (Default) (KrbtgtFullPacSignature = 3) which can be overridden by an Administrator with an explicit Audit setting.
In case you are not aware, this hardening is meant to address a security bypass and elevation of privilege vulnerabilities with Privilege Attribute Certificate (PAC) signatures in the Netlogon and Kerberos protocols (tracked under ID "CVE-2022-37967").
On its health dashboard website, the tech giant writes:
Reminder: Security hardening changes for Netlogon and Kerberos effective October 10, 2023
Windows updates release November 8, 2022 and later include changes that address security vulnerabilities affecting Windows Server domain controllers (DC). Among the addressed vulnerabilities is a Kerberos security bypass and elevation of privilege scenario involving alteration of Privilege Attribute Certificate (PAC) signatures. Changes to address this issue have been released following a series of phases throughout 2023, and are reaching the final stage of enforcement in October.
Administrators should observe changes which affect Kerberos protocol requirements and are coming into effect with the Windows updates released on and after October 10, 2023.
October 10, 2023 - Full Enforcement phase
Windows updates released on and after this date will have the following effect:
- Remove the ability to disable PAC signature addition (previously done via the registry subkey KrbtgtFullPacSignature)
- Remove support for Audit mode (this enabled authentication whether PAC signatures were missing or invalid, and created audit logs for review).
- Deny authentication to incoming service tickets without the new PAC signatures.
The phase described above is the final phase of these security hardening measures.
All domain-joined, machine accounts are affected by these vulnerabilities.
You may find more details about the topic on this page (KB5020805) on Microsoft's official website.
3 Comments - Add comment