Windows Kerberos KerbRetrieveEncodedTicketMessage AppContainer Privilege Escalation ≈ Packet Storm

Windows Kerberos KerbRetrieveEncodedTicketMessage AppContainer Privilege Escalation ≈ Packet Storm

Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]

Windows Kerberos KerbRetrieveEncodedTicketMessage AppContainer Privilege Escalation[6]
Authored by James Forshaw[7], Google Security Research[8]

On Windows 11, the Kerberos SSP's KerbRetrieveEncodedTicketMessage message can be used to get an arbitrary service ticket and session key from an AppContainer even without the enterprise authentication capability leading to elevation of privilege.

systems | windows[9]
advisories | CVE-2022-30164[10]
SHA-256 | 78434d5ce4cfd024dc8d980cdbc2c6c5bfc491c59fd75bca49f3b74f62b3a77a

Login[14] or Register[15] to add favorites

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa

File Tags

File Archives

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec[118]
close
Image

Pensée du jour :

Ce que l'homme a fait ,

l'homme peut le défaire.

 

"No secure path in the world"