Security Thoughts: Vulnerability in Group Policy could allow elevation of privilege(MS61-072, KB3163622, CVE-2016-3223)

Reading Time: 3 minutes

Yesterday, Microsoft released update 3163622 as part of its June 2016 Patch Tuesday to address an important vulnerability that affects Group Policy on Windows 10.

 

About the vulnerability

The vulnerability could allow elevation of privilege if an attacker launches a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine.

The vulnerability was disclosed responsibly to Microsoft by Tom Gilis and Nabeel Ahmed of Dimension Data.

About the update

The security update addresses the vulnerability by enforcing Kerberos authentication for certain calls over LDAP.

Affected Operating Systems

The following supported Microsoft Windows and Windows Server Operating System versions are affected by this vulnerability:

  • Windows 10
  • Windows 10 Version 1511
  • Windows Server 2012 R2 Datacenter
  • Windows Server 2012 R2 Standard
  • Windows Server 2012 R2 Essentials
  • Windows Server 2012 R2 Foundation
  • Windows 8.1 Enterprise
  • Windows 8.1 Pro
  • Windows 8.1
  • Windows RT 8.1
  • Windows Server 2012 Datacenter
  • Windows Server 2012 Standard
  • Windows Server 2012 Essentials
  • Windows Server 2012 Foundation
  • Windows Server 2008 R2 Service Pack 1
  • Windows 7 Service Pack 1
  • Windows Server 2008 Service Pack 2
  • Windows Vista Service Pack 2

Updates

KB3159398 addresses this vulnerability on Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1 and Windows Server 2012 R2.

KB3163017 addresses this vulnerability on Windows 10.
KB3163018 addresses this vulnerability on Windows 10  version 1511.

This security update is rated Important for all supported releases of Microsoft Windows.
A system restart is required after you apply this security update.

On Windows 10, updates KB3163017 and KB3163018 replace KB3156387 Cumulative Update for Windows 10: May 2016.

Mitigating factors

Domain-joined systems with servers running Windows Server 2012 and above and clients running Windows 8 and above are protected from this vulnerability by the Kerberos armoring feature.

Workarounds

Microsoft has not identified any workarounds for these vulnerabilities.

Known issues

KB3159398 changes the security context with which user group policies are retrieved. This by-design behavior change protects customers’ computers from this security vulnerability. Before KB3159398 is installed, user group policies were retrieved by using the user’s security context. After KB3159398 is installed, user group policies are retrieved by using the machines security context. This breaks Group Policy Objects (GPOs) that don't have the Read permission assigned to Authenticated Users on the Delegation tab. Group Policy MVP Darren Mar-Elia wrote a Windows PowerShell script to add Read permissions to Authenticated Users to the Group Policy objects (GPOs) in your environment.

 

Call to action

When your organization still utilizes Windows Vista-based and/or Windows 7-based devices, and/or still uses Windows Server 2008 and/or Windows Server 2008 R2-based Domain Controllers, check if your environment is impacted by running the assessment script, Ian Farr wrote and shared on the TechNet blogs. If need be, run Darren's script to reset permissions. Then, I urge you to install KB3159398 on domain-joined systems running the aforementioned Operating Systems , and KB3163017 and/or KB3163018 on domain-joined systems running Windows 10.

However, when  all Domain Controllers in domains affected clients use are running Windows Server 2012, or up, and running the Windows Server 2012 Domain Functional Level (DFL), or up, you can require client devices running Windows 8, or up, to require Kerberos Armoring (Flexible Authentication Secure Tunneling (FAST) RFC 6113). This is the best security measure to take in this case.

Kerberos Armoring saved your day. Glimlach

Related blogposts

New features in Active Directory Domain Services in Windows Server 2012, Part 11: Kerberos Armoring (FAST)

Related KnowledgeBase articles

3163622 MS16-072: Security update for Group Policy: June 14, 2016
3156387 Cumulative Update for Windows 10: May 2016

leave your comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.