Source: CrowdStrike Blog
Author: Tom Kahana
URL: https://www.crowdstrike.com/en-us/blog/analyzing-ntlm-ldap-authentication-bypass-vulnerability/
ONE SENTENCE SUMMARY:
A vulnerability (CVE-2025-54918) enables attackers to escalate privileges in Active Directory environments, mitigated by CrowdStrike Falcon solutions.
MAIN POINTS:
- CVE-2025-54918 affects Domain Controllers using LDAP or LDAPS services.
- Attackers can elevate privileges from a domain user to SYSTEM level.
- Entire Active Directory environments could be compromised.
- Exploit uses NTLM relay and coerced authentication techniques.
- NTLM relay captures and relays user authentication to another server.
- Session signing is a critical mitigation against NTLM relay attacks.
- Attackers cannot retrieve the session key needed for signed sessions.
- Mitigations include requiring server signing for secure sessions.
- CrowdStrike Falcon® solutions help protect against this vulnerability.
- Unified CrowdStrike Falcon® platform provides comprehensive security tools.
TAKEAWAYS:
- CVE-2025-54918 is a significant security threat to Active Directory.
- Effective mitigations focus on session signing.
- NTLM relay remains a prevalent attack technique.
- CrowdStrike Falcon® offers solutions for vulnerability management.
- Unified security platforms enhance protection for enterprise environments.