Unit 42 Details Advanced Exploitation of Active Directory Certificate Services

AD CS Escalation Deep Dive: How Attackers Abuse Certificate Templates for Domain Dominance

HIGH
May 12, 2026
14m read
Threat IntelligenceVulnerabilityThreat Actor

Related Entities

Threat Actors

Organizations

Products & Tech

Active Directory Certificate Services (AD CS)Cortex XDRCortex XSIAMCortex User Entity Behavior Analytics (UEBA)Cortex Cloud Identity Security

Other

Rapid7 Certipy

CVE Identifiers

CVE-2022-26923
HIGH
CVSS:8.8

Full Report

Executive Summary

Active Directory Certificate Services (AD CS) has emerged as a critical, yet frequently under-monitored, attack surface within enterprise environments. Adversaries are not leveraging zero-day vulnerabilities but are instead abusing insecure default settings, design complexities, and misconfigured certificate templates to escalate privileges, impersonate identities, and establish persistent access. This analysis from Unit 42 details the common TTPs used in these attacks, focusing on certificate template abuse (such as the ESC1 technique) and shadow credential misuse. These methods allow an attacker with low-level access to potentially gain full domain administrator privileges. The key takeaway for defenders is that traditional, signature-based detection is insufficient. Effective defense requires a shift towards behavioral analytics, diligent auditing of AD CS configurations, and a deep understanding of the legitimate-looking activities that can mask malicious intent.


Threat Overview

Active Directory Certificate Services (AD CS) is a core component of Windows enterprise infrastructure, managing the Public Key Infrastructure (PKI) that underpins authentication and encryption. However, its complexity and often-insecure default configurations make it a prime target for attackers. Instead of deploying malware, adversaries exploit the native functionality of AD CS to issue certificates that grant them the privileges of other users, including domain administrators.

This method of attack has become a standard part of the playbook for both financially motivated groups and state-sponsored actors like Fighting Ursa. The attack lifecycle typically involves five phases:

  1. Reconnaissance: Identifying the AD CS server.
  2. Enumeration: Discovering vulnerable certificate templates using tools like Certipy.
  3. Request: Requesting a malicious certificate based on a weak template.
  4. Impersonation: Using the obtained certificate to impersonate a privileged user or computer.
  5. Persistence: Maintaining access through the newly acquired credentials or by creating shadow credentials.

This approach is particularly dangerous because the malicious activity is often indistinguishable from legitimate administrative tasks, allowing attackers to operate undetected for long periods.


Technical Analysis

Adversaries primarily exploit two key weaknesses in AD CS: misconfigured certificate templates and shadow credential abuse.

Certificate Template Misconfigurations (ESC1)

The most common and impactful technique, first cataloged by SpecterOps researchers, is known as ESC1. This attack is possible when a certificate template has a specific combination of weak settings:

  • Enrollee Supplies Subject: The CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is enabled, allowing the requester to specify any Subject Alternative Name (SAN) in the Certificate Signing Request (CSR).
  • Permissive Enrollment Rights: A low-privileged user or group (like 'Domain Users') has permission to enroll in the template.
  • Grants Privileged Access: The certificate allows for authentication (e.g., 'Client Authentication' EKU) or is configured for a template like 'Subordinate Certification Authority'.

An attacker can use a tool like Certipy to enumerate these templates. Once a vulnerable template is found, the attacker requests a certificate, specifying a domain administrator's account in the SAN. The CA, trusting the template's configuration, issues the certificate. The attacker can then use this certificate with a tool like Rubeus to request a Kerberos Ticket-Granting Ticket (TGT) for the impersonated administrator, effectively granting them full domain admin rights.

This is consistent with the abuse of CVE-2022-26923, where attackers could elevate privileges by acquiring a certificate from AD CS. The report notes an instance where the file update6.exe was used in an attempt to exploit this vulnerability.

Shadow Credential Abuse

Shadow credentials are a persistence technique where an attacker, having already gained high privileges, modifies an attribute on a user or computer object (e.g., msDS-KeyCredentialLink) to add their own credential, such as a certificate. This allows the attacker to authenticate as that user without knowing their password. This modification is often not logged by default and can be extremely difficult to detect, providing the attacker with durable, stealthy persistence.

MITRE ATT&CK TTPs


Impact Assessment

The successful exploitation of AD CS can lead to a full compromise of the Active Directory domain. The business impact is severe and includes:

  • Complete Domain Takeover: Attackers can gain control of Domain Admin accounts, giving them unrestricted access to all systems, data, and resources on the network.
  • Data Exfiltration: With full access, attackers can exfiltrate sensitive corporate data, intellectual property, and customer information.
  • Ransomware Deployment: Privileged access allows for the widespread deployment of ransomware across the entire enterprise, leading to catastrophic operational disruption.
  • Stealthy Persistence: Techniques like shadow credentials provide attackers with long-term, hard-to-detect access, allowing them to remain in the network even after initial remediation efforts.

IOCs — Directly from Articles

No traditional IOCs like IP addresses or hashes were provided, but the following file name was associated with exploitation attempts.

Type
File Name
Value
update6.exe
Description
Dropped file used in an attempt to exploit CVE-2022-26923 for privilege escalation.

Cyber Observables — Hunting Hints

The following patterns could indicate related activity and can be used for threat hunting:

  • Unusual Certificate Requests: Monitor for a surge in certificate requests from unusual users or endpoints. Look for requests for templates that grant authentication from non-administrative accounts.
  • SAN Mismatches: Correlate the machine account making a certificate request with the Subject Alternative Name (SAN) in the request. A mismatch (e.g., PC1$ requesting a cert for DomainAdmin) is a strong indicator of an ESC1 attack.
  • Tool Usage: Search for command-line execution of tools like Certipy, Certify, or Rubeus. Look for command line arguments like find -vulnerable or request -ca.
  • Network Traffic: Monitor for traffic to the AD CS web enrollment pages (e.g., /certsrv/) from unusual client workstations.
  • Event Logs: Scrutinize Windows Event Logs on the CA server, particularly Event ID 4882 (request created), 4887 (request approved and certificate issued), and 4888 (request denied).

Detection & Response

Detecting AD CS abuse requires moving beyond signatures and focusing on behavior. Products like Cortex XDR and Cortex XSIAM leverage User Entity Behavior Analytics (UEBA) to identify these attacks.

  1. Monitor CA Event Logs: Forward AD CS logs to a SIEM. Create alerts for high-risk events, such as the issuance of certificates from templates that allow subject name to be supplied by the requester. Specifically, monitor Event IDs 4882, 4887, and 5136 (Directory Service Object modified, for shadow credentials).
  2. Behavioral Analytics (D3-UBA): Deploy UEBA solutions to establish a baseline of normal user and entity behavior. Anomalies, such as a user account that has never interacted with AD CS suddenly requesting a certificate, should trigger an alert.
  3. Network Traffic Analysis (D3-NTA): Analyze traffic to and from the CA. Any non-standard communication or connections from unexpected sources should be investigated.
  4. Endpoint Detection: Use an EDR solution to monitor for the execution of suspicious processes and command-line arguments related to certificate enumeration and request tools (certipy.exe, certreq.exe).

Mitigation

Strengthening AD CS security involves a combination of configuration hardening, access control, and monitoring.

  1. Audit and Harden Certificate Templates: This is the most critical step. Review all certificate templates and disable or remove any that are not required. For those in use, ensure they are configured securely:
    • Disable the Enrollee Supplies Subject setting (CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT) on templates where it is not absolutely necessary.
    • If required, enable the 'Manager Approval' setting to add a human verification step.
    • Use the Restrict enrollment agents setting.
  2. Apply Principle of Least Privilege (D3-UAP): Tightly control who has enrollment permissions on certificate templates. Avoid granting these rights to broad groups like 'Authenticated Users' or 'Domain Users'.
  3. Patching (D3-SU): Ensure all domain controllers and CA servers are fully patched to protect against known vulnerabilities like CVE-2022-26923.
  4. Enable Enhanced Logging: Increase logging levels for AD CS and Active Directory to capture detailed information about certificate requests and object modifications.
  5. Restrict NTLM: Where possible, disable NTLM authentication and enforce Kerberos, which can help mitigate some relay-style attacks associated with certificate abuse.

Timeline of Events

1
June 1, 2021
SpecterOps researchers publish the 'Certified Pre-Owned' whitepaper, detailing AD CS escalation techniques ESC1 through ESC8.
2
August 1, 2024
Rapid7 describes a social engineering campaign where attackers attempted to exploit CVE-2022-26923 for privilege escalation.
3
May 11, 2026
Unit 42 publishes 'Inside AD CS Escalation', providing a technical deep-dive into advanced exploitation and detection methods.
4
May 12, 2026
This article was published

MITRE ATT&CK Mitigations

Harden AD CS templates by disabling dangerous settings and restricting enrollment permissions to prevent abuse.

Strictly control and monitor accounts that have permissions to modify certificate templates or approve certificate requests.

Audit

M1047enterprise

Enable and monitor detailed logging on Certificate Authority servers and Domain Controllers to detect suspicious certificate issuance and object modifications.

Apply security patches for known vulnerabilities like CVE-2022-26923 to prevent exploitation.

Enforce the principle of least privilege for user accounts, ensuring they do not have unnecessary permissions to enroll in sensitive certificate templates.

While not a direct fix for certificate abuse, requiring MFA for privileged account access can mitigate the impact of a compromised certificate.

D3FEND Defensive Countermeasures

The most critical defense against AD CS abuse is hardening the AD CS application itself. Security teams must conduct a thorough audit of all certificate templates on their Certificate Authorities. Specifically, identify any template where the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is enabled. For each, validate the business need and, if not absolutely required, disable this flag immediately. If it is required, ensure that the template also requires manager approval for issuance. Furthermore, review the enrollment permissions for every template. Remove broad groups like 'Authenticated Users' or 'Domain Users' from the access control lists of any template that could be used for authentication. Permissions should be granted on a need-to-have basis to specific, narrow security groups. This process directly mitigates the ESC1 attack path by removing the foundational misconfigurations that attackers rely on. This should be treated as a critical hardening task for any enterprise using AD CS.

Given that AD CS attacks target identity, monitoring domain accounts for anomalous behavior is key to detection. Implement robust logging and monitoring for Active Directory and the CA servers. Specifically, forward Windows Event Logs to a SIEM and create detection rules for suspicious activity. A high-fidelity rule would be to alert whenever a certificate is issued from a template allowing 'enrollee supplies subject' where the requester's identity does not match the Subject Alternative Name (SAN) in the issued certificate. This requires correlating Event ID 4887 (certificate issued) with network session information and the certificate details. Additionally, monitor for modifications to sensitive attributes like msDS-KeyCredentialLink, which indicates potential shadow credential abuse. A UEBA solution can automate this by baselining normal account activity and flagging deviations, such as a service account suddenly requesting a certificate for a domain administrator.

Applying the principle of least privilege is a foundational countermeasure. In the context of AD CS, this means rigorously controlling who can request which certificates. Conduct a full review of the 'Security' tab on every certificate template. Ensure that enrollment and auto-enrollment rights are granted only to the specific users or computers that require them. For highly sensitive templates, such as those used for domain controller authentication or subordinate CAs, permissions should be restricted to a very small group of administrator accounts. This prevents a low-privileged attacker from being able to even attempt an ESC1-style attack. By removing the initial access to the vulnerable template, the entire attack chain is broken at the first step. This should be part of a regular access review cycle for critical infrastructure like PKI.

Timeline of Events

1
June 1, 2021

SpecterOps researchers publish the 'Certified Pre-Owned' whitepaper, detailing AD CS escalation techniques ESC1 through ESC8.

2
August 1, 2024

Rapid7 describes a social engineering campaign where attackers attempted to exploit CVE-2022-26923 for privilege escalation.

3
May 11, 2026

Unit 42 publishes 'Inside AD CS Escalation', providing a technical deep-dive into advanced exploitation and detection methods.

Sources & References

Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools
Unit 42 (unit42.paloaltonetworks.com) May 11, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

AD CSActive DirectoryPrivilege EscalationCertificate TemplatesESC1Shadow CredentialsUEBAPKICVE-2022-26923Certipy

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.