Skip to content

H3-2024-0037

Azure Cloud Kerberos Trust Abuse

Category CREDENTIALS
Base Score 4.2

Description

The cloud Kerberos trust relationship between the on-premises domain and Microsoft Entra ID can be abused to perform lateral movement or privilege escalation by modifying hybrid user properties in Entra ID. Lateral movement allows attackers to move between synchronized identities in Entra ID and the on-premises domain, while privilege escalation allows the attacker to perform actions as a privileged user from within the on-premises domain.

Impact

Attackers with access to privileged Microsoft Entra ID credentials can perform lateral movement to the on-premises domain by abusing the cloud Kerberos trust that exists between Microsoft Entra ID and the on-premises domain. As a result, the attacker can obtain the NT hash, or TGT, of a domain user. If Microsoft Entra Connect Sync is enabled on the domain, the MSOL account can be targeted to obtain DCSync privileges that are capable of dumping all credentials from the on-premises domain controller.

References