Kerberos Bronze Bit Attack: CVE-2020-17049 – Practical Exploitation
We started with comprehensive research into Kerberos and Microsoft's extensions in Active Directory.
Then we took a closer look at the TGS_REP data structure returned by the KDC after the S4U2self exchange. Specifically, where the Forwardable flag is located in the response.
Jake found that the Forwardable flag was not in the Privileged Attribute Certificate (PAC). An attacker could decrypt, set the Forwardable flag's value to 1, and re-encrypt the service ticket.
The KDC was unable to detect that the value was tampered with because it was not in the signed PAC.
We were able to successfully convert a non-forwardable ticket into a Forwardable ticket.
This attack bypasses two key protections:
External Network
CVE-2020-17049: Kerberos Bronze Bit Attack – Explained and Exploited