⚠ Actively exploited
Added to CISA KEV on 2022-03-25. Federal agencies required to patch by 2022-04-15. Required action: Apply updates per vendor instructions..

CVE-2014-6324Microsoft Windows Server 2008 vulnerability

CWE-26410 documents10 sources
Severity
8.8HIGHNVD
EPSS
89.9%
top 0.42%
CISA KEV
KEV
Added 2022-03-25
Due 2022-04-15
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedNov 18
KEV addedMar 25
KEV dueApr 15
Latest updateFeb 12
CISA Required Action: Apply updates per vendor instructions.

Description

The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability."

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-j28h-3q4c-49h2: The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1,2022-05-14
VulnCheck
Microsoft Kerberos Key Distribution Center (KDC) Privilege Escalation Vulnerability2014

💥Exploits & PoCs

2
Exploit-DB
Microsoft Windows Kerberos - Privilege Escalation (MS14-068)2014-12-05
Metasploit
MS14-068 Microsoft Kerberos Checksum Validation Vulnerability

🔍Detection Rules

1
Suricata
ET EXPLOIT Possible GoldenPac Priv Esc in-use2014-12-12

📋Vendor Advisories

1
CISA
Microsoft Kerberos Key Distribution Center (KDC) Privilege Escalation Vulnerability2022-03-25

🕵️Threat Intelligence

1
Threat Intel
Threat Group-3390 (Threat Group-3390, Earth Smilodon, TG-3390)

📄Research Papers

2
arXiv
Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures2025-02-12
CTF
README