Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » Unicode Manipulation: CVE-2026-25177 Privilege Escalation in AD

Unicode Manipulation: CVE-2026-25177 Privilege Escalation in AD

Posted on 12/03/202625/03/2026 Link State By Link State No Comments on Unicode Manipulation: CVE-2026-25177 Privilege Escalation in AD
CVE 2026 25177 Privilege Escalation In AD

This article discusses “Unicode Manipulation: CVE-2026-25177 Privilege Escalation in AD”. On March 10, 2026, Microsoft disclosed a new security vulnerability affecting Active Directory Domain Services (AD DS). Please, see How to run Apps as an administrator on Windows, and how to Enable Exploit Protection feature on Windows using the Windows Security App, Microsoft Endpoint Configuration Manager, and Group Policy.

The flaw, identified as CVE‑2026‑25177, allows an authenticated attacker to gain privilege escalation over the network, potentially reaching SYSTEM‑level privileges, the highest level in Windows environments.

Microsoft classified the vulnerability as Important, assigning it a CVSS 3.1 score of 8.8, indicating a high-risk issue especially for enterprise environments where Active Directory is the core identity and authentication infrastructure.

Technically, the vulnerability is linked to CWE‑641: Improper Restriction of Names for Files and Other Resources. The issue stems from insufficient validation of names for certain resources inside Active Directory. Specifically, it affects Service Principal Names (SPN) and User Principal Names (UPN), which are critical for Kerberos authentication.

Microsoft explains that an attacker with limited privileges but authorized to modify SPNs on an account can exploit specially crafted Unicode characters to bypass internal controls designed to prevent duplicate name creation in Active Directory.

How to How to use the built-in Azure Active Directory Connect tool, How to check and assign privileges to a MySQL User, and “CVE-2021-22048: VMware vCenter Server updates address a privilege escalation vulnerability“.

Exploit Not Disclosed

Microsoft stated at publication time that the vulnerability had not been publicly disclosed before the patch and that no active exploits are known to exist in the wild.

The issue can allow the creation of duplicate SPNs that bypass standard Active Directory validation checks. The attack works by inserting carefully crafted Unicode characters into an SPN or UPN to generate what appears to be a legitimate duplicate of an existing service name.

When a client requests Kerberos authentication for that service, the Domain Controller may issue a ticket encrypted with the wrong key, causing the target service to reject it.

This behavior can lead to operational issues:

  • in some cases, the service may experience a denial of service due to invalid Kerberos tickets;
  • in other scenarios, the system may fall back to NTLM authentication, which still exists in many legacy environments and could open the door to additional attack techniques that rely on NTLM.

If you wish to read more, kindly vist the following page. Also, see how to replace Veeam Recovery Orchestrator License, and how to Fix failed to connect to the backup server: Make sure it is online

I hope you found this post on “Unicode Manipulation: CVE-2026-25177 Privilege Escalation in AD” very useful. Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, Active Directory Domain Services, CVE-2026-25177, CVE-2026-25177 Privilege Escalation in AD, Hardening Active Directory, Microsoft Windows, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2025

Post navigation

Previous Post: How to replace Veeam Recovery Orchestrator License
Next Post: Azure File Sync : How to enable Self-Service restore

Related Posts

  • WinPE
    How to uninstall and upgrade ADK, WinPE, and MDT Windows Server
  • VHDX resizing and veeam back
    Hyper V Disk allocation: Why Veeam reports full size after Shrinking Windows Server
  • fix 0x00400d error
    Fix the request to add or remove features failed 0x00400d Windows Server
  • Missing ADML File
    Fix an appropriate resource file could not be found for LAPS Windows
  • banner 3
    How to Enable or Disable SuperFetch in Windows 11 Windows
  • Screenshot 2022 04 27 at 17.51.48
    Remote Desktop Services Setup on Windows Server Windows Server

More Related Articles

WinPE How to uninstall and upgrade ADK, WinPE, and MDT Windows Server
VHDX resizing and veeam back Hyper V Disk allocation: Why Veeam reports full size after Shrinking Windows Server
fix 0x00400d error Fix the request to add or remove features failed 0x00400d Windows Server
Missing ADML File Fix an appropriate resource file could not be found for LAPS Windows
banner 3 How to Enable or Disable SuperFetch in Windows 11 Windows
Screenshot 2022 04 27 at 17.51.48 Remote Desktop Services Setup on Windows Server Windows Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • sql server installation
    Install SQL Server 2022 Express and SQL Server Management Studio Oracle/MSSQL/MySQL
  • Screenshot 2020 11 17 at 12.20.15
    PA Server Monitor Ultra: How to setup PA Server Monitor Reviews
  • Machine does not support XSAve
    How to disable side-channel mitigations on VMware Workstation Virtualization
  • LDPAs
    Fix LDAP Connection Error 81: Cannot open connection via the ldp.exe tool Windows
  • images 2
    How to configure and use Pleasant Password RDP SSO Password Manager
  • sdf
    What is GPO and how can it be launched in Windows Windows Server
  • maxresdefault
    Linux Directory Hierarchy Linux
  • dsdfg
    Create a Bootable USB Drive Using dd Command on Linux Linux

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,817 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.