Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » Unicode Manipulation: CVE-2026-25177 Privilege Escalation in AD

Unicode Manipulation: CVE-2026-25177 Privilege Escalation in AD

Posted on 12/03/202625/03/2026 Link State By Link State No Comments on Unicode Manipulation: CVE-2026-25177 Privilege Escalation in AD
CVE 2026 25177 Privilege Escalation In AD

This article discusses “Unicode Manipulation: CVE-2026-25177 Privilege Escalation in AD”. On March 10, 2026, Microsoft disclosed a new security vulnerability affecting Active Directory Domain Services (AD DS). Please, see How to run Apps as an administrator on Windows, and how to Enable Exploit Protection feature on Windows using the Windows Security App, Microsoft Endpoint Configuration Manager, and Group Policy.

The flaw, identified as CVE‑2026‑25177, allows an authenticated attacker to gain privilege escalation over the network, potentially reaching SYSTEM‑level privileges, the highest level in Windows environments.

Microsoft classified the vulnerability as Important, assigning it a CVSS 3.1 score of 8.8, indicating a high-risk issue especially for enterprise environments where Active Directory is the core identity and authentication infrastructure.

Technically, the vulnerability is linked to CWE‑641: Improper Restriction of Names for Files and Other Resources. The issue stems from insufficient validation of names for certain resources inside Active Directory. Specifically, it affects Service Principal Names (SPN) and User Principal Names (UPN), which are critical for Kerberos authentication.

Microsoft explains that an attacker with limited privileges but authorized to modify SPNs on an account can exploit specially crafted Unicode characters to bypass internal controls designed to prevent duplicate name creation in Active Directory.

How to How to use the built-in Azure Active Directory Connect tool, How to check and assign privileges to a MySQL User, and “CVE-2021-22048: VMware vCenter Server updates address a privilege escalation vulnerability“.

Exploit Not Disclosed

Microsoft stated at publication time that the vulnerability had not been publicly disclosed before the patch and that no active exploits are known to exist in the wild.

The issue can allow the creation of duplicate SPNs that bypass standard Active Directory validation checks. The attack works by inserting carefully crafted Unicode characters into an SPN or UPN to generate what appears to be a legitimate duplicate of an existing service name.

When a client requests Kerberos authentication for that service, the Domain Controller may issue a ticket encrypted with the wrong key, causing the target service to reject it.

This behavior can lead to operational issues:

  • in some cases, the service may experience a denial of service due to invalid Kerberos tickets;
  • in other scenarios, the system may fall back to NTLM authentication, which still exists in many legacy environments and could open the door to additional attack techniques that rely on NTLM.

If you wish to read more, kindly vist the following page. Also, see how to replace Veeam Recovery Orchestrator License, and how to Fix failed to connect to the backup server: Make sure it is online

I hope you found this post on “Unicode Manipulation: CVE-2026-25177 Privilege Escalation in AD” very useful. Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, Active Directory Domain Services, CVE-2026-25177, CVE-2026-25177 Privilege Escalation in AD, Hardening Active Directory, Microsoft Windows, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2025

Post navigation

Previous Post: How to replace Veeam Recovery Orchestrator License
Next Post: Azure File Sync : How to enable Self-Service restore

Related Posts

  • Could not load file or assembly
    Unable to edit MDT XML unattended file: Could not load file Windows Server
  • img 1686
    The trust relationship between this workstation and the primary domain failed Windows Server
  • 05kvj2jzbpj1ugp4etb4gdf 19.fit scale.size 2698x1517 e1690630247655
    Various methods to launch the Event Viewer Windows Server
  • firewall windows 1
    How to create a Windows firewall rule on Windows Windows Server
  • Account restrictions are preventing this user from signing in
    Resolve Account restrictions are preventing this user from signing in: User Account Password has expired Windows
  • Slide2 1
    Create and Delete AD DS Partition with NTDSUTIL.EXE Windows Server

More Related Articles

Could not load file or assembly Unable to edit MDT XML unattended file: Could not load file Windows Server
img 1686 The trust relationship between this workstation and the primary domain failed Windows Server
05kvj2jzbpj1ugp4etb4gdf 19.fit scale.size 2698x1517 e1690630247655 Various methods to launch the Event Viewer Windows Server
firewall windows 1 How to create a Windows firewall rule on Windows Windows Server
Account restrictions are preventing this user from signing in Resolve Account restrictions are preventing this user from signing in: User Account Password has expired Windows
Slide2 1 Create and Delete AD DS Partition with NTDSUTIL.EXE Windows Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • a3a5a8be58fa09468cd4f70d36869e98
    Restore AD Objects: How to restore deleted user accounts in Active Directory with Microsoft LDP and PowerShell Windows Server
  • Screenshot 2022 03 20 at 21.08.50
    How to integrate AWS CodeBuild and AWS CodeCommit to SonarCloud AWS/Azure/OpenShift
  • image 117
    Deploy MVC Application to AWS EC2 Using RDP and Web Deploy Configuration Management Tool
  • Set a Resource Delete Lock
    How to Add a Delete Lock on Azure Resources AWS/Azure/OpenShift
  • TrueCrypt to BitLocker
    How to Migrate from TrueCrypt to BitLocker Backup
  • Screenshot 2022 04 28 at 22.35.11
    Fix “There was a problem starting logilda.dll” in Windows Windows
  • BLOG LOGO
    How to create a static pod in Kubernetes AWS/Azure/OpenShift
  • Remove Custom Domain from Entra ID and Azure tenant
    Delete Azure Tenant: Remove Custom Domain from Entra ID AWS/Azure/OpenShift

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,805 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

Loading Comments...

You must be logged in to post a comment.