Vulnerable Object Types
The following object types, if misconfigured, can comprise an ESC5 vulnerability:PKI Object Types Vulnerable to ESC5
PKI Object Types Vulnerable to ESC5
- The CA server’s computer domain object
- The CA server’s RPC/DCOM server
- Any descendant object in the PKI container (
CN=Public Key Services,CN=Services,CN=Configuration,DC=CORP,DC=LOCAL)- The
Certificate Templatescontainer - The
Certification Authoritiescontainer - The
Enrollment Servicescontainer - The
NTAuthCertificatesobject
- The
Detection
While Certify does not facilitate abuse-functions for most of these cases, we can search for misconfigured access controls in PKI-related objects using theenum-pkiobjects command from Certify. For more information about the command and its parameters, please refer to the Command Overview page.
The above output shows that the
Domain Users group has full control over all descendants of the Certificate Templates container.