The November 8, 2022 Windows updates address security bypass and elevation of privilege vulnerabilities with Privilege Attribute Certificate (PAC) signatures. This security update addresses Kerberos vulnerabilities where an attacker could digitally alter PAC signatures, raising their privileges.
To help secure your environment, install this Windows update to all devices, including Windows domain controllers. All domain controllers in your domain must be updated first before switching the update to Enforced mode.
Take Action
To help protect your environment and prevent outages, we recommend that you do the following steps:
Note Step 1 of installing updates released on or after November 8, 2022 will NOT address the security issues in CVE-2022-37967 for Windows devices by default. To fully mitigate the security issue for all devices, you must move to Audit mode (described in Step 2) followed by Enforced mode (described in Step 4) as soon as possible on all Windows domain controllers.
Important Starting July 2023, Enforcement mode will be enabled on all Windows domain controllers and will block vulnerable connections from non-compliant devices. At that time, you will not be able to disable the update, but may move back to the Audit mode setting. Audit mode will be removed in October 2023, as outlined in the Timing of updates to address Kerberos vulnerability CVE-2022-37967 section.
Updates will be released in phases: the initial phase for updates released on or after November 8, 2022 and the Enforcement phase for updates released on or after June 13, 2023.
The initial deployment phase starts with the updates released on November 8, 2022 and continues with later Windows updates until the Enforcement phase. This update adds signatures to the Kerberos PAC buffer but does not check for signatures during authentication. Thus, secure mode is disabled by default.
This update:
The second deployment phase starts with updates released on December 13, 2022. These and later updates make changes to the Kerberos protocol to audit Windows devices by moving Windows domain controllers to Audit mode.
With this update, all devices will be in Audit mode by default:
The Windows updates released on or after June 13, 2023 will do the following:
To deploy the Windows updates that are dated November 8, 2022 or later Windows updates, follow these steps:
STEP 1: UPDATE
Deploy the November 8, 2022 or later updates to all applicable Windows domain controllers (DCs). After deploying the update, Windows domain controllers that have been updated will have signatures added to the Kerberos PAC Buffer and will be insecure by default (PAC signature is not validated).
STEP 2: MOVE
Once the Windows domain controllers are updated, switch to Audit mode by changing the KrbtgtFullPacSignature value to 2.
STEP 3: FIND/MONITOR
Identify areas that either are missing PAC signatures or have PAC Signatures that fail validation through the Event Logs triggered during Audit mode.
STEP 4: ENABLE
Enable Enforcement mode to address CVE-2022-37967 in your environment.
After installing the Windows updates that are dated on or after November 8, 2022, the following registry key is available for the Kerberos protocol:
KrbtgtFullPacSignature
This registry key is used to gate the deployment of the Kerberos changes. This registry key is temporary, and will no longer be read after the full Enforcement date of October 10, 2023.
In Audit mode, you may find either of the following errors if PAC Signatures are missing or invalid. If this issue continues during Enforcement mode, these events will be logged as errors.
If you find either error on your device, it is likely that all Windows domain controllers in your domain are not up to date with a November 8, 2022 or later Windows update. To mitigate the issues, you will need to investigate your domain further to find Windows domain controllers that are not up to date.
Note If you find an error with Event ID 42, please see KB5021131: How to manage the Kerberos protocol changes related to CVE-2022-37966.
Event Log | System |
Event Type | Warning |
Event Source | Microsoft-Windows-Kerberos-Key-Distribution-Center |
Event ID | 43 |
Event Text | The Key Distribution Center (KDC) encountered a ticket that it could not validate the full PAC Signature. See https://go.microsoft.com/fwlink/?linkid=2210019 to learn more. Client : <realm>/<Name> |
Domains that have third-party domain controllers might see errors in Enforcement mode.
Domains with third-party clients might take longer to fully be cleared of audit events following the installation of a November 8, 2022 or later Windows update.
Contact the device manufacturer (OEM) or software vendor to determine if their software is compatible with the latest protocol change.
For information about protocol updates, see the Windows Protocol topic on the Microsoft website.
So, that’s all in this blog. I will meet you soon with next stuff .Have a nice day !!!
Guys please don’t forget to like and share the post.Also join our Active Directory page and where you can post your queries/doubts and our experts will address them .
You can also share the feedback on below ActiveDirectory email id.
If you have any questions feel free to contact us on admin@activedirectory.in also follow us on facebook page to get updates about new blog posts.
Moving a domain controller (DC) to a production site after promotion involves several steps. Here's…
In Active Directory, staging and production sites refer to different environments used for testing and deploying changes…
If a domain controller (DC) has been down for an extended period of time, there…
Netlogon logs contain information related to the Netlogon service on a Windows Server, which is responsible for authenticating…
In Active Directory, sites are a logical construct used to group together network resources (such as domain…
You can redirect a specific subnet to authenticate from a particular Active Directory site by using site…