Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
CloudZ RAT Steals SMS OTPs via Microsoft Phone Abuses Link
May 6, 2026
QLNX Credential Theft Targets Developers for Supply Chain Comprom
May 6, 2026
MajorDoMo RCE Vulnerability Exposes Servers Code Execution
May 6, 2026
Home/CyberSecurity News/New Kerberos Relay Attack Bypasses Mitigations via DNS
CyberSecurity News

New Kerberos Relay Attack Bypasses Mitigations via DNS

A newly identified critical flaw in Windows Kerberos authentication significantly expands the attack surface for credential relay attacks within Active Directory environments. By abusing how Windows...

David kimber
David kimber
January 19, 2026 3 Min Read
1 0

A newly identified critical flaw in Windows Kerberos authentication significantly expands the attack surface for credential relay attacks within Active Directory environments.

By abusing how Windows clients handle DNS CNAME responses during Kerberos service ticket requests, attackers can coerce systems into requesting tickets for attacker-controlled services, bypassing traditional protections.

Abuse flow chart
Abuse flow chart (Source: Cymulate)

The Attack Vector

The vulnerability centers on a fundamental behavior: when a Windows client receives a DNS CNAME record, it follows the alias. It constructs the Ticket Granting Service (TGS) request using the CNAME hostname as the Service Principal Name (SPN).

An attacker positioned on-path to intercept DNS traffic can exploit this to force victims into requesting service tickets for attacker-chosen targets.

The technique requires an attacker to establish DNS man-in-the-middle capabilities through ARP poisoning, DHCPv6 poisoning (MITM6), or similar methods.

The victim is redirected to the attacker’s server, which responds with 401 to force Kerberos authentication.
The victim is redirected to the attacker’s server, which responds with 401 to force Kerberos authentication. (Source: Cymulate)

When a victim attempts to access a legitimate domain asset, the malicious DNS server responds with a CNAME record pointing to an attacker-controlled hostname, along with an A record resolving to the attacker’s IP address.

This causes the victim to authenticate against the attacker’s infrastructure using a ticket intended for the attacker’s target service.

Attack Capabilities and Impact:

Impact Area Description
RCE Remote code execution via ADCS Web Enrollment (ESC8)
Relay Attacks Cross-protocol relays (HTTP→SMB, HTTP→LDAP)
Lateral Movement Unauthorized access and network spread
Impersonation User impersonation without passwords

Testing confirmed exploitation works on default configurations across Windows 10, Windows 11, Windows Server 2022, and Windows Server 2025.

The attack succeeds against unprotected services, including SMB, HTTP, and LDAP, when signing or Channel Binding Tokens (CBT) are not enforced. The vulnerability was responsibly disclosed to Microsoft in October 2025.

DNS poisoning redirects the victim to a malicious target, forcing a Kerberos TGS request.
DNS poisoning redirects the victim to a malicious target, forcing a Kerberos TGS request. (Source: Cymulate)

In response, Microsoft implemented CBT support for HTTP.sys. It released patches across supported Windows Server versions in January 2026 security updates, tracked as CVE-2026-20929.

However, this mitigation only addresses HTTP relay scenarios. The underlying DNS CNAME coercion primitive remains unchanged, leaving other protocols vulnerable.

Proof of Concept

Researchers released a modified version of the MITM6 tool on GitHub with CNAME poisoning capabilities. The tool supports targeted CNAME poisoning against specific domains or all DNS queries.

Includes DNS-only mode for ARP poisoning integration, and enables passthrough for critical infrastructure connectivity. Exploitation requires Python 3.x and a Linux operating system.

A record for adcs-server.mycorp.local pointing to the attacker’s IP 
A record for adcs-server.mycorp.local pointing to the attacker’s IP  (Source: Cymulate)

Cymulate Research Labs advises organizations to implement layered defenses:

Security Layer Recommended Control Purpose
SMB Security Enforce SMB signing on all servers beyond domain controllers Prevents SMB relay and man-in-the-middle attacks
Directory Services Require LDAP signing and enforce LDAPS Channel Binding Tokens (CBT) where supported Protects against LDAP relay and credential interception
Web Services Mandate HTTPS with CBT for all internal HTTP services Mitigates NTLM relay attacks over HTTP
DNS Infrastructure Harden DNS servers and consider DNS over HTTPS (DoH) Reduces DNS spoofing and traffic manipulation risks
Kerberos Monitoring Monitor anomalous TGS requests targeting unusual SPNs Detects potential Kerberos abuse or lateral movement
Threat Detection Alert on cross-protocol authentication patterns Identifies NTLM/Kerberos relay and protocol abuse attempts

The research underscores a critical security reality: Kerberos itself does not inherently prevent relay attacks.  Enforcement of protection lies at the service level.

After DNS poisoning, the victim connects to the attacker’s rogue HTTP or SMB server.
After DNS poisoning, the victim connects to the attacker’s rogue HTTP or SMB server.(Source: Cymulate)

Disabling NTLM alone is insufficient; organizations must explicitly enforce anti-relay protections across every Kerberos-enabled service to eliminate relay risk effectively.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Redmi Buds Flaw Exposes Call Data & Vulnerability Allow

Next Post

CrashFix: Hackers Use Malicious Extensions for Fake

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Prolific Russian Ransomware Member Sentenced to Group Months
May 6, 2026
Detect Phishing-to-RMM Attacks Analysts Trusted-Tool
May 6, 2026
Hackers Exploit Microsoft Teams to Steal Credentials &
May 6, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us