Site icon TheCyberThrone

CVE-2025-26685 impacts Microsoft Defender with Identity Spoofing

Advertisements

A new security vulnerability, designated as CVE-2025-26685, has been identified in Microsoft Defender for Identity, an Active Directory security solution used to detect identity-based threats. This vulnerability, rated as medium severity (CVSS score 6.5), allows attackers on an adjacent network to perform spoofing attacks, potentially leading to credential theft and privilege escalation in Active Directory environments.

Security researchers from NetSPI discovered the vulnerability, demonstrating that an attacker could coerce Defender for Identity sensors into authenticating to a malicious system, effectively stealing Net-NTLM authentication hashes that could then be relayed to gain higher privileges within Active Directory.

As identity-related attacks become more frequent, organizations relying on Defender for Identity must patch their deployments immediately to prevent potential exploitation.

  1. Technical Breakdown of CVE-2025-26685

🛑 Key Details

📌 How the Attack Works

This vulnerability highlights the dangers of NTLM authentication and its susceptibility to relay attacks, reinforcing the need for organizations to enforce Kerberos authentication.

  1. Affected Microsoft Defender for Identity Deployments

🖥️ Vulnerable Systems
📌 CVE-2025-26685 affects Defender for Identity sensors installed on Domain Controllers.

⚠️ Exploitation Risks if Left Unpatched

Organizations relying on Microsoft Defender for Identity should apply security updates immediately to mitigate this spoofing risk.

  1. Recommended Security Measures

✅ Immediate Mitigation Strategies

Organizations should also conduct proactive security audits to ensure their active directory environments are hardened against identity-based attacks.

  1. Conclusion & Next Steps

CVE-2025-26685 is a serious authentication vulnerability that requires immediate action from organizations using Microsoft Defender for Identity. A delayed response could result in identity spoofing, privilege escalation, and unauthorized access to critical systems.

📢 Recommended Actions:
✔️ Apply Microsoft’s latest security updates to patch CVE-2025-26685.
✔️ Disable NTLM authentication to prevent credential relay attacks.
✔️ Monitor security logs for unusual authentication attempts.

Exit mobile version