{"id":1020,"date":"2014-11-19T10:02:37","date_gmt":"2014-11-19T10:02:37","guid":{"rendered":"http:\/\/www.bsk-consulting.de\/?p=1020"},"modified":"2022-03-25T14:12:01","modified_gmt":"2022-03-25T13:12:01","slug":"critical-zero-day-vulnerability-kerberos-service-cve-2014-6324","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/","title":{"rendered":"Critical Zero Day Vulnerability &#8211; Kerberos Service &#8211; CVE-2014-6324"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.4.3&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;](please find below the English version of the\u00a0blog post)<br \/>\nWir informieren Sie hiermit \u00fcber eine kritische Zero-Day-L\u00fccke im Kerberos Dienst aller Microsoft Windows Server Versionen.<\/p>\n<h2>Schwachstelle<\/h2>\n<p>Die als CVE-2014-6324 bekannt gewordene Schwachstelle im Kerberos Dienst aller Windows Versionen erm\u00f6glicht es einem Angreifer mit einem umprivilegierten Dom\u00e4nen-Konto seine Rechte auf ein beliebiges anderes Konto in der Dom\u00e4ne zu erh\u00f6hen. Er kann seine Rechte auch zu einem Dom\u00e4nen-Administrator eskalieren. Die Schwachstelle kann in allen Servern ausgenutzt werden, die als Kerberos Key Distribution Center (KDC) fungieren. (N\u00e4here Informationen finden sich im TechNet Artikel [1])<br \/>\nExploitcode ist im Internet bereits verf\u00fcgbar.<br \/>\nDieser Exploitcode adressiert die Schwachstelle in Windows Versionen 2008 R2 und niedriger. F\u00fcr die Windows 2012 Versionen ist derzeit noch kein Exploitcode verf\u00fcgbar.<\/p>\n<h2>Betroffene Programme<\/h2>\n<p>Grunds\u00e4tzlich sind alle Windows Versionen von der Schwachstelle betroffen.<\/p>\n<ul>\n<li>Windows Server 2003<\/li>\n<li>Windows Server 2008<\/li>\n<li>Windows Server 2008 R2<\/li>\n<li>Windows Server 2012<\/li>\n<li>Windows Server 2012 R2<\/li>\n<li>All Windows Server Core versions<\/li>\n<\/ul>\n<p>Die Schwachstelle l\u00e4sst sich bei allen Servern ausnutzen, die als Kerberos Key Distribution Center (KDC) agieren. Sie gef\u00e4hrdet also Active Directory Domain Controller.<\/p>\n<h2>Erkennung von Angriffen<\/h2>\n<p>Angriffe auf den Dienst k\u00f6nnen in einem SIEM System sichtbar gemacht werden. Im TechNet Artikel [1] finden Sie Details zur Erkennung.<\/p>\n<h2>Empfehlungen und m\u00f6gliche Gegenma\u00dfnahmen<\/h2>\n<p>Wir empfehlen, vor alle Windows Server Systeme, die als Active Directory Domain Controller fungieren, umgehend zu patchen.<br \/>\nDer relevante Patch KB3011780 kann \u00fcber den unten angegebenen Link [3] bezogen werden.<br \/>\nDer Hotfix war nicht im Patch Set des November Patch Day enthalten. Es handelt sich um einen kritischen Patch, der au\u00dferhalb des Zyklus verteilt wird.<\/p>\n<h2>Quellen \/ Weiterf\u00fchrende Links<\/h2>\n<p>[1] Technet Blog<br \/>\n<a href=\"http:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/11\/18\/additional-information-about-cve-2014-6324.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/11\/18\/additional-information-about-cve-2014-6324.aspx<\/a><br \/>\n[2] Heise Security Artikel (Deutsch)<br \/>\n<a href=\"http:\/\/www.heise.de\/security\/meldung\/Update-ausser-der-Reihe-fuer-Zero-Day-in-allen-Windows-Serverversionen-2460000.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.heise.de\/security\/meldung\/Update-ausser-der-Reihe-fuer-Zero-Day-in-allen-Windows-Serverversionen-2460000.html<\/a><br \/>\n[3] Advisory MS14-068 (Englisch)<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/MS14-068\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/en-us\/library\/security\/MS14-068<\/a><br \/>\n&nbsp;<\/p>\n<hr \/>\n<p>&nbsp;<br \/>\nWe hereby informs you about a critical zero-day vulnerability in the Kerberos service of all Microsoft Windows server products.<\/p>\n<h2>Vulnerability<\/h2>\n<p>The vulnerability listed as CVE-2014-6324 allows remote elevation of privilege in domains running Windows domain controllers. An attacker with the credentials of any domain user can elevate their privileges to that of any other account on the domain (including domain administrator accounts).<br \/>\nThe vulnerability can be exploited in all systems that serve as Kerberos Key Distribution Center (KDC). (Please find further information on the details in the TechNet article listed below [1])<br \/>\nExploit codes are already available.<br \/>\nThe available exploit codes target the vulnerability in Windows version 2008 R2 and lower. Currently there are no exploit codes circulating for Windows versions of 2012.<\/p>\n<h2>Affected Software<\/h2>\n<p>Basically all Microsoft Windows versions are affected by this vulnerability.<\/p>\n<ul>\n<li>Windows Server 2003<\/li>\n<li>Windows Server 2008<\/li>\n<li>Windows Server 2008 R2<\/li>\n<li>Windows Server 2012<\/li>\n<li>Windows Server 2012 R2<\/li>\n<li>All Windows Server Core versions<\/li>\n<\/ul>\n<p>The vulnerability can be exploited on systems that serve as Kerberos Key Distribution Center (KDC). That means that Active Directory Domain Controllers of all versions are affected by this vulnerability.<\/p>\n<h2>Detection of Exploitation Attempts<\/h2>\n<p>Exploitation attempts can be detected via a suitable SIEM system. Please visit the TechNet article [1] for more details.<\/p>\n<h2>Recommendations and Counter Measures<\/h2>\n<p>We recommend patching all Windows server systems that serve as Active Directory Domain Controllers immediately.<br \/>\nThe relevant security hot fix KB3011780 is available via the the link [3] at the end of this email.<br \/>\nThe patch was not included in the November patch day set. This is a critical out-of-band patch.<\/p>\n<h2>Sources \/ Links<\/h2>\n<p>[1] Technet Blog (English)<br \/>\n<a href=\"http:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/11\/18\/additional-information-about-cve-2014-6324.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/11\/18\/additional-information-about-cve-2014-6324.aspx<\/a><br \/>\n[2] Heise Security Artikel (German)<br \/>\n<a href=\"http:\/\/www.heise.de\/security\/meldung\/Update-ausser-der-Reihe-fuer-Zero-Day-in-allen-Windows-Serverversionen-2460000.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.heise.de\/security\/meldung\/Update-ausser-der-Reihe-fuer-Zero-Day-in-allen-Windows-Serverversionen-2460000.html<\/a><br \/>\n[3] Advisory MS14-068 (English)<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/MS14-068\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/en-us\/library\/security\/MS14-068<\/a>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(please find below the English version of the\u00a0blog post) Wir informieren Sie hiermit \u00fcber eine kritische Zero-Day-L\u00fccke im Kerberos Dienst aller Microsoft Windows Server Versionen. Schwachstelle Die als CVE-2014-6324 bekannt gewordene Schwachstelle im Kerberos Dienst aller Windows Versionen erm\u00f6glicht es einem Angreifer mit einem umprivilegierten Dom\u00e4nen-Konto seine Rechte auf ein beliebiges anderes Konto in der Dom\u00e4ne zu erh\u00f6hen. Er kann seine Rechte auch zu einem Dom\u00e4nen-Administrator eskalieren. Die Schwachstelle kann in allen Servern ausgenutzt werden, die als Kerberos Key Distribution Center (KDC) fungieren. (N\u00e4here Informationen finden sich im TechNet Artikel [1]) Exploitcode ist im Internet bereits verf\u00fcgbar. Dieser Exploitcode adressiert die Schwachstelle in Windows Versionen 2008 R2 und niedriger. F\u00fcr die Windows 2012 Versionen ist derzeit noch kein Exploitcode verf\u00fcgbar. Betroffene Programme Grunds\u00e4tzlich sind alle Windows Versionen von der Schwachstelle betroffen. Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 All Windows Server Core versions Die Schwachstelle l\u00e4sst sich bei allen Servern ausnutzen, die als Kerberos Key Distribution Center (KDC) agieren. Sie gef\u00e4hrdet also Active Directory Domain Controller. Erkennung von Angriffen Angriffe auf den Dienst k\u00f6nnen in einem SIEM System sichtbar gemacht werden. Im TechNet Artikel [1] finden Sie Details zur Erkennung. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"(please find below the English version of the\u00a0blog post)\r\nWir informieren Sie hiermit \u00fcber eine kritische Zero-Day-L\u00fccke im Kerberos Dienst aller Microsoft Windows Server Versionen.\r\n<h2>Schwachstelle<\/h2>\r\nDie als CVE-2014-6324 bekannt gewordene Schwachstelle im Kerberos Dienst aller Windows Versionen erm\u00f6glicht es einem Angreifer mit einem umprivilegierten Dom\u00e4nen-Konto seine Rechte auf ein beliebiges anderes Konto in der Dom\u00e4ne zu erh\u00f6hen. Er kann seine Rechte auch zu einem Dom\u00e4nen-Administrator eskalieren. Die Schwachstelle kann in allen Servern ausgenutzt werden, die als Kerberos Key Distribution Center (KDC) fungieren. (N\u00e4here Informationen finden sich im TechNet Artikel [1])\r\nExploitcode ist im Internet bereits verf\u00fcgbar.\r\nDieser Exploitcode adressiert die Schwachstelle in Windows Versionen 2008 R2 und niedriger. F\u00fcr die Windows 2012 Versionen ist derzeit noch kein Exploitcode verf\u00fcgbar.\r\n<h2>Betroffene Programme<\/h2>\r\nGrunds\u00e4tzlich sind alle Windows Versionen von der Schwachstelle betroffen.\r\n<ul>\r\n\t<li>Windows Server 2003<\/li>\r\n\t<li>Windows Server 2008<\/li>\r\n\t<li>Windows Server 2008 R2<\/li>\r\n\t<li>Windows Server 2012<\/li>\r\n\t<li>Windows Server 2012 R2<\/li>\r\n\t<li>All Windows Server Core versions<\/li>\r\n<\/ul>\r\nDie Schwachstelle l\u00e4sst sich bei allen Servern ausnutzen, die als Kerberos Key Distribution Center (KDC) agieren. Sie gef\u00e4hrdet also Active Directory Domain Controller.\r\n<h2>Erkennung von Angriffen<\/h2>\r\nAngriffe auf den Dienst k\u00f6nnen in einem SIEM System sichtbar gemacht werden. Im TechNet Artikel [1] finden Sie Details zur Erkennung.\r\n<h2>Empfehlungen und m\u00f6gliche Gegenma\u00dfnahmen<\/h2>\r\nWir empfehlen, vor alle Windows Server Systeme, die als Active Directory Domain Controller fungieren, umgehend zu patchen.\r\nDer relevante Patch KB3011780 kann \u00fcber den unten angegebenen Link [3] bezogen werden.\r\nDer Hotfix war nicht im Patch Set des November Patch Day enthalten. Es handelt sich um einen kritischen Patch, der au\u00dferhalb des Zyklus verteilt wird.\r\n<h2>Quellen \/ Weiterf\u00fchrende Links<\/h2>\r\n[1] Technet Blog\r\n<a href=\"http:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/11\/18\/additional-information-about-cve-2014-6324.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/11\/18\/additional-information-about-cve-2014-6324.aspx<\/a>\r\n[2] Heise Security Artikel (Deutsch)\r\n<a href=\"http:\/\/www.heise.de\/security\/meldung\/Update-ausser-der-Reihe-fuer-Zero-Day-in-allen-Windows-Serverversionen-2460000.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.heise.de\/security\/meldung\/Update-ausser-der-Reihe-fuer-Zero-Day-in-allen-Windows-Serverversionen-2460000.html<\/a>\r\n[3] Advisory MS14-068 (Englisch)\r\n<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/MS14-068\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/en-us\/library\/security\/MS14-068<\/a>\r\n\u00a0\r\n<hr \/>\r\n\u00a0\r\nWe hereby informs you about a critical zero-day vulnerability in the Kerberos service of all Microsoft Windows server products.\r\n<h2>Vulnerability<\/h2>\r\nThe vulnerability listed as CVE-2014-6324 allows remote elevation of privilege in domains running Windows domain controllers. An attacker with the credentials of any domain user can elevate their privileges to that of any other account on the domain (including domain administrator accounts).\r\nThe vulnerability can be exploited in all systems that serve as Kerberos Key Distribution Center (KDC). (Please find further information on the details in the TechNet article listed below [1])\r\nExploit codes are already available.\r\nThe available exploit codes target the vulnerability in Windows version 2008 R2 and lower. Currently there are no exploit codes circulating for Windows versions of 2012.\r\n<h2>Affected Software<\/h2>\r\nBasically all Microsoft Windows versions are affected by this vulnerability.\r\n<ul>\r\n\t<li>Windows Server 2003<\/li>\r\n\t<li>Windows Server 2008<\/li>\r\n\t<li>Windows Server 2008 R2<\/li>\r\n\t<li>Windows Server 2012<\/li>\r\n\t<li>Windows Server 2012 R2<\/li>\r\n\t<li>All Windows Server Core versions<\/li>\r\n<\/ul>\r\nThe vulnerability can be exploited on systems that serve as Kerberos Key Distribution Center (KDC). That means that Active Directory Domain Controllers of all versions are affected by this vulnerability.\r\n<h2>Detection of Exploitation Attempts<\/h2>\r\nExploitation attempts can be detected via a suitable SIEM system. Please visit the TechNet article [1] for more details.\r\n<h2>Recommendations and Counter Measures<\/h2>\r\nWe recommend patching all Windows server systems that serve as Active Directory Domain Controllers immediately.\r\nThe relevant security hot fix KB3011780 is available via the the link [3] at the end of this email.\r\nThe patch was not included in the November patch day set. This is a critical out-of-band patch.\r\n<h2>Sources \/ Links<\/h2>\r\n[1] Technet Blog (English)\r\n<a href=\"http:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/11\/18\/additional-information-about-cve-2014-6324.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/blogs.technet.com\/b\/srd\/archive\/2014\/11\/18\/additional-information-about-cve-2014-6324.aspx<\/a>\r\n[2] Heise Security Artikel (German)\r\n<a href=\"http:\/\/www.heise.de\/security\/meldung\/Update-ausser-der-Reihe-fuer-Zero-Day-in-allen-Windows-Serverversionen-2460000.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.heise.de\/security\/meldung\/Update-ausser-der-Reihe-fuer-Zero-Day-in-allen-Windows-Serverversionen-2460000.html<\/a>\r\n[3] Advisory MS14-068 (English)\r\n<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/MS14-068\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/en-us\/library\/security\/MS14-068<\/a>","_et_gb_content_width":"","footnotes":""},"categories":[327],"tags":[363,483,484,485,486,487,51,488,215,235,489,471,490,94,491],"class_list":["post-1020","post","type-post","status-publish","format-standard","hentry","category-alert","tag-0day","tag-ad","tag-best-practice","tag-controller","tag-cve-2014-6324","tag-domain","tag-exploit","tag-kdc","tag-kerberos","tag-microsoft","tag-ms-14-068","tag-patch","tag-recommendations","tag-server","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Critical Zero Day vulnerability - Kerberos Service<\/title>\n<meta name=\"description\" content=\"A Critical Zero Day vulnerability of the Kerberos Service threatens all Windows Aactive Directory Domain Controllers\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Critical Zero Day Vulnerability &#8211; Kerberos Service &#8211; CVE-2014-6324\",\"datePublished\":\"2014-11-19T10:02:37+00:00\",\"dateModified\":\"2022-03-25T13:12:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/\"},\"wordCount\":686,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"0day\",\"AD\",\"best practice\",\"Controller\",\"CVE-2014-6324\",\"Domain\",\"Exploit\",\"KDC\",\"Kerberos\",\"Microsoft\",\"MS-14-068\",\"patch\",\"recommendations\",\"server\",\"vulnerability\"],\"articleSection\":[\"Alert\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/\",\"name\":\"Critical Zero Day vulnerability - Kerberos Service\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2014-11-19T10:02:37+00:00\",\"dateModified\":\"2022-03-25T13:12:01+00:00\",\"description\":\"A Critical Zero Day vulnerability of the Kerberos Service threatens all Windows Aactive Directory Domain Controllers\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical Zero Day vulnerability - Kerberos Service","description":"A Critical Zero Day vulnerability of the Kerberos Service threatens all Windows Aactive Directory Domain Controllers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Critical Zero Day Vulnerability &#8211; Kerberos Service &#8211; CVE-2014-6324","datePublished":"2014-11-19T10:02:37+00:00","dateModified":"2022-03-25T13:12:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/"},"wordCount":686,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["0day","AD","best practice","Controller","CVE-2014-6324","Domain","Exploit","KDC","Kerberos","Microsoft","MS-14-068","patch","recommendations","server","vulnerability"],"articleSection":["Alert"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/","url":"https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/","name":"Critical Zero Day vulnerability - Kerberos Service","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2014-11-19T10:02:37+00:00","dateModified":"2022-03-25T13:12:01+00:00","description":"A Critical Zero Day vulnerability of the Kerberos Service threatens all Windows Aactive Directory Domain Controllers","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2014\/11\/19\/critical-zero-day-vulnerability-kerberos-service-cve-2014-6324\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/1020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=1020"}],"version-history":[{"count":3,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/1020\/revisions"}],"predecessor-version":[{"id":7524,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/1020\/revisions\/7524"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=1020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=1020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=1020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}