Overview

A critical vulnerability in Microsoft Active Directory exposes how Group Policy security controls can be bypassed, allowing deprecated NTLMv1 authentication despite restrictions. The flaw stems from misconfigured on-premise applications that override security settings through the Netlogon Remote Protocol

Whom it may concern

  • Active Directory administrators
  • Security operations teams
  • Application security managers
  • Compliance officers

Key Findings

  1. NTLMv1 authentication can bypass Group Policy restrictions through NETLOGON_LOGON_IDENTITY_INFO structure
  1. Microsoft has officially deprecated NTLMv1 in Windows 11 v24H2 and Windows Server 2025
  1. Misconfigured applications can override network-wide security policies

Risk Analysis

  • Probability: High - Easily exploitable through common misconfigurations
  • Impact: Severe - Enables authentication relay attacks
  • Attack Surface: All Windows domains using Active Directory
  • Exposure Period: Until application configurations are remediated

Action Items

  • Enable comprehensive NTLM authentication audit logging
  • Monitor for NTLMv1 authentication attempts
  • Identify and remediate vulnerable applications
  • Implement regular configuration reviews
  • Update to latest Windows versions where possible

Sources

  • [The Hacker News](https://thehackernews.com/2025/01/researchers-find-exploit-allowing.html)
Share this article

Stay up to date

Join my community and receive the latest risk news and trends.