Active Directory Certificate Services (AD CS) has emerged as a critical, yet frequently under-monitored, attack surface within enterprise environments. Adversaries are not leveraging zero-day vulnerabilities but are instead abusing insecure default settings, design complexities, and misconfigured certificate templates to escalate privileges, impersonate identities, and establish persistent access. This analysis from Unit 42 details the common TTPs used in these attacks, focusing on certificate template abuse (such as the ESC1 technique) and shadow credential misuse. These methods allow an attacker with low-level access to potentially gain full domain administrator privileges. The key takeaway for defenders is that traditional, signature-based detection is insufficient. Effective defense requires a shift towards behavioral analytics, diligent auditing of AD CS configurations, and a deep understanding of the legitimate-looking activities that can mask malicious intent.
Active Directory Certificate Services (AD CS) is a core component of Windows enterprise infrastructure, managing the Public Key Infrastructure (PKI) that underpins authentication and encryption. However, its complexity and often-insecure default configurations make it a prime target for attackers. Instead of deploying malware, adversaries exploit the native functionality of AD CS to issue certificates that grant them the privileges of other users, including domain administrators.
This method of attack has become a standard part of the playbook for both financially motivated groups and state-sponsored actors like Fighting Ursa. The attack lifecycle typically involves five phases:
This approach is particularly dangerous because the malicious activity is often indistinguishable from legitimate administrative tasks, allowing attackers to operate undetected for long periods.
Adversaries primarily exploit two key weaknesses in AD CS: misconfigured certificate templates and shadow credential abuse.
The most common and impactful technique, first cataloged by SpecterOps researchers, is known as ESC1. This attack is possible when a certificate template has a specific combination of weak settings:
CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is enabled, allowing the requester to specify any Subject Alternative Name (SAN) in the Certificate Signing Request (CSR).An attacker can use a tool like Certipy to enumerate these templates. Once a vulnerable template is found, the attacker requests a certificate, specifying a domain administrator's account in the SAN. The CA, trusting the template's configuration, issues the certificate. The attacker can then use this certificate with a tool like Rubeus to request a Kerberos Ticket-Granting Ticket (TGT) for the impersonated administrator, effectively granting them full domain admin rights.
This is consistent with the abuse of CVE-2022-26923, where attackers could elevate privileges by acquiring a certificate from AD CS. The report notes an instance where the file update6.exe was used in an attempt to exploit this vulnerability.
Shadow credentials are a persistence technique where an attacker, having already gained high privileges, modifies an attribute on a user or computer object (e.g., msDS-KeyCredentialLink) to add their own credential, such as a certificate. This allows the attacker to authenticate as that user without knowing their password. This modification is often not logged by default and can be extremely difficult to detect, providing the attacker with durable, stealthy persistence.
T1068 - Exploitation for Privilege Escalation: The core purpose of abusing AD CS is to escalate from a low-privilege account to a high-privilege one.T1648.003 - Certificate-based Authentication: Attackers leverage certificates obtained from AD CS to authenticate as privileged users.T1087.002 - Domain Account: Attackers enumerate domain accounts to identify high-privilege targets for impersonation.T1558.003 - Kerberoasting: While not directly AD CS, obtaining a privileged TGT via a certificate is a similar end-goal.T1078 - Valid Accounts: The ultimate goal is to gain access to and use valid, privileged accounts.The successful exploitation of AD CS can lead to a full compromise of the Active Directory domain. The business impact is severe and includes:
No traditional IOCs like IP addresses or hashes were provided, but the following file name was associated with exploitation attempts.
update6.exeThe following patterns could indicate related activity and can be used for threat hunting:
PC1$ requesting a cert for DomainAdmin) is a strong indicator of an ESC1 attack.Certipy, Certify, or Rubeus. Look for command line arguments like find -vulnerable or request -ca./certsrv/) from unusual client workstations.4882 (request created), 4887 (request approved and certificate issued), and 4888 (request denied).Detecting AD CS abuse requires moving beyond signatures and focusing on behavior. Products like Cortex XDR and Cortex XSIAM leverage User Entity Behavior Analytics (UEBA) to identify these attacks.
4882, 4887, and 5136 (Directory Service Object modified, for shadow credentials).certipy.exe, certreq.exe).Strengthening AD CS security involves a combination of configuration hardening, access control, and monitoring.
Enrollee Supplies Subject setting (CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT) on templates where it is not absolutely necessary.Restrict enrollment agents setting.Harden AD CS templates by disabling dangerous settings and restricting enrollment permissions to prevent abuse.
Strictly control and monitor accounts that have permissions to modify certificate templates or approve certificate requests.
Enable and monitor detailed logging on Certificate Authority servers and Domain Controllers to detect suspicious certificate issuance and object modifications.
Apply security patches for known vulnerabilities like CVE-2022-26923 to prevent exploitation.
Enforce the principle of least privilege for user accounts, ensuring they do not have unnecessary permissions to enroll in sensitive certificate templates.
While not a direct fix for certificate abuse, requiring MFA for privileged account access can mitigate the impact of a compromised certificate.
The most critical defense against AD CS abuse is hardening the AD CS application itself. Security teams must conduct a thorough audit of all certificate templates on their Certificate Authorities. Specifically, identify any template where the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is enabled. For each, validate the business need and, if not absolutely required, disable this flag immediately. If it is required, ensure that the template also requires manager approval for issuance. Furthermore, review the enrollment permissions for every template. Remove broad groups like 'Authenticated Users' or 'Domain Users' from the access control lists of any template that could be used for authentication. Permissions should be granted on a need-to-have basis to specific, narrow security groups. This process directly mitigates the ESC1 attack path by removing the foundational misconfigurations that attackers rely on. This should be treated as a critical hardening task for any enterprise using AD CS.
Given that AD CS attacks target identity, monitoring domain accounts for anomalous behavior is key to detection. Implement robust logging and monitoring for Active Directory and the CA servers. Specifically, forward Windows Event Logs to a SIEM and create detection rules for suspicious activity. A high-fidelity rule would be to alert whenever a certificate is issued from a template allowing 'enrollee supplies subject' where the requester's identity does not match the Subject Alternative Name (SAN) in the issued certificate. This requires correlating Event ID 4887 (certificate issued) with network session information and the certificate details. Additionally, monitor for modifications to sensitive attributes like msDS-KeyCredentialLink, which indicates potential shadow credential abuse. A UEBA solution can automate this by baselining normal account activity and flagging deviations, such as a service account suddenly requesting a certificate for a domain administrator.
Applying the principle of least privilege is a foundational countermeasure. In the context of AD CS, this means rigorously controlling who can request which certificates. Conduct a full review of the 'Security' tab on every certificate template. Ensure that enrollment and auto-enrollment rights are granted only to the specific users or computers that require them. For highly sensitive templates, such as those used for domain controller authentication or subordinate CAs, permissions should be restricted to a very small group of administrator accounts. This prevents a low-privileged attacker from being able to even attempt an ESC1-style attack. By removing the initial access to the vulnerable template, the entire attack chain is broken at the first step. This should be part of a regular access review cycle for critical infrastructure like PKI.
SpecterOps researchers publish the 'Certified Pre-Owned' whitepaper, detailing AD CS escalation techniques ESC1 through ESC8.
Rapid7 describes a social engineering campaign where attackers attempted to exploit CVE-2022-26923 for privilege escalation.
Unit 42 publishes 'Inside AD CS Escalation', providing a technical deep-dive into advanced exploitation and detection methods.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.