Skip to content

H3-2024-0057

Active Directory gMSA Account Password Exposure

Category SECURITY_MISCONFIGURATION
Base Score 7.1

Description

A regular domain account was found to have access in Active Directory to the NTLM hashes of Group Managed Service Account (gMSA) users.

Impact

An attacker can 'pass-the-hash' to access services and hosts connected to the domain as the gMSA account. This could enable an attacker to move laterally or escalate privileges in the environment.

References