Skip to content

H3-2026-0011

Reversible Password Encryption Enabled on Domain Controller

Category SECURITY_MISCONFIGURATION
Base Score 9.0

Description

When reversible password encryption is enabled on a Windows Active Directory (AD) Domain Controller, the Domain Controller stores users' passwords using a weak, reversible encryption scheme rather than the standard one-way hash. This is required by legacy protocols such as CHAP (used by remote access/IAS) and Digest Authentication in IIS, but it significantly weakens credential security. The setting applies only to passwords set after it is enabled – existing password hashes are not retroactively converted.

Impact

Attackers with sufficient access can decrypt the stored passwords by combining four components: the encrypted password blob (G$RADIUSCHAP) from the user's userParameters attribute in Active Directory; a 16-byte randomly generated value (G$RADIUSCHAPKEY); the global LSA secret; and a static key embedded in RASSFM.DLL. Successfully recovering the encryption key allows the attacker to decrypt affected users' plaintext passwords, bypassing password cracking entirely and enabling lateral movement, persistence, and cross-service credential reuse.

References