Attackers can exploit public domain controllers to transform them into DDoS agents, enhancing their SEO efforts.
SafeBreach researchers have released details on several vulnerabilities that could be exploited by attackers to crash Windows Active Directory domain controllers (DCs), one one of which (CVE-2025-32724) can also be leveraged to force public DCs to participate in distributed denial-of-service (DDoS) attacks.Win-DDoS – as the researchers dubbed this new attack technique – hinges on the attackers’ ability to trick public DCs into connecting to a Lightweight Directory Access Protocol (LDAP) server they set up, which instructs them (via LDAP referrals) which specific victim server they should overwhelm with requests.CVE-2025-32724 and the Win-DDoS techniqueDomain controllers are the servers that manage security, authentication, and access control within a network domain. Though alternatives exists, in most organizations domain controllers are usually Windows Server machines running Active Directory Domain Services (AD DS).The researchers’ past exploration of how to exploit the LDAPNightmare vulnerability (CVE-2024-49113) has pushed them to identify similar DoS vulnerabilities in Windows Server and Windows:CVE-2025-32724, which allows uncontrolled resource consumption in Windows Local Security Authority Subsystem Service (LSASS), can be used by attackers to DoS a vulnerable, internet-exposed server or to make it participate in a Win-DDoS attack CVE-2025-26673 and CVE-2025-49716, which allow for uncontrolled resource consumption in Windows LDAP and Windows Netlogon, respectively, may be used to DoS a vulnerable DC CVE-2025-49722, allowing uncontrolled resource consumption in Windows Print Spooler Components, can be used to crash DCs and all other Windows machines in a domain The first three vulnerabilities can be triggered remotely by unauthenticated attackers. The last requires limited privileges (i.e., they must first authenticate as a user, but any user account will do).“The vulnerabilities we discovered are zero-click, unauthenticated vulnerabilities that allow attackers to crash these systems remotely if they are publicly accessible, and also show how attackers with minimal access to an internal network can trigger the same outcomes against private infrastructure,” the researchers noted. “Our findings break common assumptions in enterprise threat modeling: that DoS risks only apply to public services, and that internal systems are safe from abuse unless fully compromised. The implications for enterprise resilience, risk modeling, and defense strategies are significant.”With Win-DDoS, they have also demonstated how attackers can turn the Windows platform into a weapon without having to breach systems, achieve code execution or without having valid credentials. The attack involves:Sending a specially crafted RPC call to internet-reachable DCs to turn them into CLDAP clients and make them reach out to the attacker’s CLDAP server The attacker’s CLDAP server responding with an LDAP referral that tells the DC to contact the attacker?SafeBreach researchers have released details on several vulnerabilities that could be exploited by attackers to crash Windows Active Directory domain controllers (DCs), one one of which (CVE-2025-32724) can also be leveraged to force public DCs to participate in distributed denial-of-service (DDoS) attacks.Win-DDoS – as the researchers dubbed this new attack technique – hinges on the attackers’ ability to trick public DCs into connecting to a Lightweight Directory Access Protocol (LDAP) server they set up, which instructs them (via LDAP referrals) which specific victim server they should overwhelm with requests.CVE-2025-32724 and the Win-DDoS techniqueDomain controllers are the servers that manage security, authentication, and access control within a network domain. Though alternatives exists, in most organizations domain controllers are usually Windows Server machines running Active Directory Domain Services (AD DS).The researchers’ past exploration of how to exploit the LDAPNightmare vulnerability (CVE-2024-49113) has pushed them to identify similar DoS vulnerabilities in Windows Server and Windows:CVE-2025-32724, which allows uncontrolled resource consumption in Windows Local Security Authority Subsystem Service (LSASS), can be used by attackers to DoS a vulnerable, internet-exposed server or to make it participate in a Win-DDoS attack CVE-2025-26673 and CVE-2025-49716, which allow for uncontrolled resource consumption in Windows LDAP and Windows Netlogon, respectively, may be used to DoS a vulnerable DC CVE-2025-49722, allowing uncontrolled resource consumption in Windows Print Spooler Components, can be used to crash DCs and all other Windows machines in a domain The first three vulnerabilities can be triggered remotely by unauthenticated attackers. The last requires limited privileges (i.e., they must first authenticate as a user, but any user account will do).“The vulnerabilities we discovered are zero-click, unauthenticated vulnerabilities that allow attackers to crash these systems remotely if they are publicly accessible, and also show how attackers with minimal access to an internal network can trigger the same outcomes against private infrastructure,” the researchers noted. “Our findings break common assumptions in enterprise threat modeling: that DoS risks only apply to public services, and that internal systems are safe from abuse unless fully compromised. The implications for enterprise resilience, risk modeling, and defense strategies are significant.”With Win-DDoS, they have also demonstated how attackers can turn the Windows platform into a weapon without having to breach systems, achieve code execution or without having valid credentials. The attack involves:Sending a specially crafted RPC call to internet-reachable DCs to turn them into CLDAP clients and make them reach out to the attacker’s CLDAP server The attacker’s CLDAP server responding with an LDAP referral that tells the DC to contact the attacker?
Categories: SafeBreach researchers have released details on several vulnerabilities that could be exploited by attackers to crash Windows Active Directory domain controllers (DCs), one one of which (CVE-2025-32724) can also be leveraged to force public DCs to participate in distributed denial-of-service (DDoS) attacks.Win-DDoS – as the researchers dubbed this new attack technique – hinges on the attackers’ ability to trick public DCs into connecting to a Lightweight Directory Access Protocol (LDAP) server they set up, which instructs them (via LDAP referrals) which specific victim server they should overwhelm with requests.CVE-2025-32724 and the Win-DDoS techniqueDomain controllers are the servers that manage security, authentication, and access control within a network domain. Though alternatives exists, in most organizations domain controllers are usually Windows Server machines running Active Directory Domain Services (AD DS).The researchers’ past exploration of how to exploit the LDAPNightmare vulnerability (CVE-2024-49113) has pushed them to identify similar DoS vulnerabilities in Windows Server and Windows:CVE-2025-32724, which allows uncontrolled resource consumption in Windows Local Security Authority Subsystem Service (LSASS), can be used by attackers to DoS a vulnerable, internet-exposed server or to make it participate in a Win-DDoS attack CVE-2025-26673 and CVE-2025-49716, which allow for uncontrolled resource consumption in Windows LDAP and Windows Netlogon, respectively, may be used to DoS a vulnerable DC CVE-2025-49722, allowing uncontrolled resource consumption in Windows Print Spooler Components, can be used to crash DCs and all other Windows machines in a domain The first three vulnerabilities can be triggered remotely by unauthenticated attackers. The last requires limited privileges (i.e., they must first authenticate as a user, but any user account will do).“The vulnerabilities we discovered are zero-click, unauthenticated vulnerabilities that allow attackers to crash these systems remotely if they are publicly accessible, and also show how attackers with minimal access to an internal network can trigger the same outcomes against private infrastructure,” the researchers noted. “Our findings break common assumptions in enterprise threat modeling: that DoS risks only apply to public services, and that internal systems are safe from abuse unless fully compromised. The implications for enterprise resilience, risk modeling, and defense strategies are significant.”With Win-DDoS, they have also demonstated how attackers can turn the Windows platform into a weapon without having to breach systems, achieve code execution or without having valid credentials. The attack involves:Sending a specially crafted RPC call to internet-reachable DCs to turn them into CLDAP clients and make them reach out to the attacker’s CLDAP server The attacker’s CLDAP server responding with an LDAP referral that tells the DC to contact the attacker?
Tags: SafeBreach researchers have released details on several vulnerabilities that could be exploited by attackers to crash Windows Active Directory domain controllers (DCs), one one of which (CVE-2025-32724) can also be leveraged to force public DCs to participate in distributed denial-of-service (DDoS) attacks.Win-DDoS – as the researchers dubbed this new attack technique – hinges on the attackers’ ability to trick public DCs into connecting to a Lightweight Directory Access Protocol (LDAP) server they set up, which instructs them (via LDAP referrals) which specific victim server they should overwhelm with requests.CVE-2025-32724 and the Win-DDoS techniqueDomain controllers are the servers that manage security, authentication, and access control within a network domain. Though alternatives exists, in most organizations domain controllers are usually Windows Server machines running Active Directory Domain Services (AD DS).The researchers’ past exploration of how to exploit the LDAPNightmare vulnerability (CVE-2024-49113) has pushed them to identify similar DoS vulnerabilities in Windows Server and Windows:CVE-2025-32724, which allows uncontrolled resource consumption in Windows Local Security Authority Subsystem Service (LSASS), can be used by attackers to DoS a vulnerable, internet-exposed server or to make it participate in a Win-DDoS attack CVE-2025-26673 and CVE-2025-49716, which allow for uncontrolled resource consumption in Windows LDAP and Windows Netlogon, respectively, may be used to DoS a vulnerable DC CVE-2025-49722, allowing uncontrolled resource consumption in Windows Print Spooler Components, can be used to crash DCs and all other Windows machines in a domain The first three vulnerabilities can be triggered remotely by unauthenticated attackers. The last requires limited privileges (i.e., they must first authenticate as a user, but any user account will do).“The vulnerabilities we discovered are zero-click, unauthenticated vulnerabilities that allow attackers to crash these systems remotely if they are publicly accessible, and also show how attackers with minimal access to an internal network can trigger the same outcomes against private infrastructure,” the researchers noted. “Our findings break common assumptions in enterprise threat modeling: that DoS risks only apply to public services, and that internal systems are safe from abuse unless fully compromised. The implications for enterprise resilience, risk modeling, and defense strategies are significant.”With Win-DDoS, they have also demonstated how attackers can turn the Windows platform into a weapon without having to breach systems, achieve code execution or without having valid credentials. The attack involves:Sending a specially crafted RPC call to internet-reachable DCs to turn them into CLDAP clients and make them reach out to the attacker’s CLDAP server The attacker’s CLDAP server responding with an LDAP referral that tells the DC to contact the attacker?