Skip to main content
This comprehensive guide covers all 16 known ESC (Escalation) techniques for privilege escalation using Active Directory Certificate Services misconfigurations.

Strong Certificate Mapping

In May 2022, Microsoft introduced Strong Certificate Mapping, which implemented a security extension for certificate templates that includes the security identifier (SID) of the requesting user. This was done to combat Certifried (CVE-2022–26923), and was initially released in a compatibility mode that allowed “Weak Certificate Mapping” until February 2025, after which the mode has switched to full enforcement.Unless explicitly downgraded, every environment should be considered in full enforcement mode.

ESC Techniques Overview

The following privilege escalation techniques exploit various misconfigurations in Active Directory Certificate Services to elevate privileges from low-privileged accounts to high-privileged accounts, including Domain Admins:

Template Misconfigurations (ESC1-3)

Access Control Vulnerabilities (ESC4-5, ESC7)

CA Configuration Issues (ESC6, ESC8, ESC11)

Certificate Mapping Issues (ESC9-10, ESC13-16)

Hardware-Based Attacks (ESC12)

General Prerequisites

Most ESC techniques require:
  • Access to an Active Directory environment with AD CS deployed
  • Low-privileged domain user account
  • Network access to Certificate Authority servers
  • Understanding of PKI concepts and certificate enrollment

Common Attack Patterns

Most attacks begin with enumerating certificate templates using Certify to identify vulnerable configurations.
Attackers request certificates using vulnerable templates, often specifying alternative identities or elevated privileges.
The issued certificate is used for authentication, typically with Kerberos PKINIT, to obtain elevated access.

Detection and Mitigation

Organizations should implement comprehensive monitoring and hardening for Certificate Services infrastructure.

Monitoring Recommendations

  • Monitor certificate enrollment events (Event ID 4886, 4887)
  • Track certificate template modifications
  • Alert on certificates with unusual Subject Alternative Names
  • Monitor authentication events using certificates
  • Regular auditing of certificate template configurations

Hardening Guidelines

  • Remove ENROLLEE_SUPPLIES_SUBJECT flag from templates
  • Implement proper template access controls
  • Enable manager approval for sensitive templates
  • Consider Strong Certificate Mapping enforcement
  • Regular review of CA flags and configurations

Next Steps

Select a specific ESC technique from the categories above to learn detailed implementation steps, enumeration methods, and exploitation techniques. Each technique includes specific prerequisites, detection methods, and mitigation strategies.