IRONSMITHINTEL
HIGHCVSS7.8
|CVE-2024-49019|Auth: low — any user with enrol permission on a vulnerable template|Reboot: required|Est. 2–4 hours including template review and reboot|Manual only

Active Directory Certificate Services v1 Template EoP — Forged EKU Yields Domain Admin (CVE-2024-49019)

Default version-1 AD CS certificate templates that allow "Supplied in the request" subject names let any user who can enrol issue a certificate as any principal — including a domain administrator. TrustedSec published the "EKUwu" technique. Apply the November 2024 cumulative update and audit templates immediately.

Published Nov 12, 2024 · Updated May 16, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

An authenticated low-privilege user — or any compromised user account — can enrol against a vulnerable v1 template, request a certificate as `Administrator@domain.local` with the Client Authentication EKU, and use it to authenticate as Domain Admin. This is a one-shot privilege escalation to full domain compromise that leaves only certificate-issuance audit trails (which most organisations do not actively monitor).

How the attack works

AD CS version-1 certificate templates with "Source of subject name" set to "Supplied in the request" allow the requester to specify both the subject and arbitrary Extended Key Usages (EKUs). If broad enrolment permissions exist on such a template, a low-privilege user can request a certificate bearing the EKUs and subject of a privileged account, then use that certificate to authenticate as that account via PKINIT or schannel. Affected: every Windows Server with AD CS deployed (2008 SP2 through 2025) prior to the November 2024 Patch Tuesday and not properly hardened.

Am I affected?Quick check

Probably yes if any of these apply:

Active Directory Certificate Services Servers
Domain Administrators
PKI Administrators
Identity Security Team
Running Windows Server 2008 SP2 through Windows Server 2025 running the AD CS role, prior to the November 2024 cumulative update

Affected OS versions

Windows Server 2008 SP2Windows Server 2008 R2 SP1Windows Server 2012Windows Server 2012 R2Windows Server 2016Windows Server 2019Windows Server 2022Windows Server 2022 23H2Windows Server 2025
Fixed inNovember 2024 Patch Tuesday cumulative update (see manual_steps for per-OS KB lookup)
Real-world incidentsWhat we've seen

TrustedSec disclosed the AD CS misconfiguration class — including CVE-2024-49019 — under the name "EKUwu" in late 2024. Microsoft's November 2024 update tightens the validation logic, but the long-term fix requires explicit template hardening: removing broad enrolment permissions, adding request signature or certificate-manager approval requirements, and deleting unused v1 templates. AD CS-based privilege escalation chains (ESC1–ESC15) remain the single most productive technique for red teams in Active Directory environments since Certified Pre-Owned (2021).

How to patch

Manual remediation steps

2–4 hours including template review and reboot

Identify vulnerable v1 templates

# On a domain-joined host with the ADCS RSAT module:
Get-CATemplate | Where-Object { $_.Version -eq 1 } |
  Select-Object Name, OID, Version

# Use Certify.exe (Ghostpack) or PSPKIAudit to enumerate enrol permissions
# and "Supplied in the request" templates:
Invoke-PSPKIAudit  # https://github.com/GhostPack/PSPKIAudit

Apply the November 2024 cumulative update on every AD CS server

1
Open Microsoft Update Catalog: https://catalog.update.microsoft.com
2
Search for CVE-2024-49019 to find the current superseding cumulative for your OS
3
Approve via WSUS / SCCM, or download the MSU and run as Administrator
4
Restart each issuing CA in turn

Harden vulnerable templates (required even after patch)

# In the Certificate Templates console (certtmpl.msc):
# 1. For any v1 template still in use, change "Subject Name" tab from
#    "Supply in the request" to "Build from this Active Directory information".
# 2. Or remove the template from issuance entirely if not actively required.
# 3. Restrict "Enroll" permissions to specific groups — never to "Authenticated
#    Users" or "Domain Users".
# 4. For templates that must allow request-supplied subjects, require
#    certificate manager approval or additional request signatures.

Verify

# Confirm AD CS server build is at or above November 2024 level:
(Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion").UBR
# Re-run PSPKIAudit and confirm no v1 "Supplied in the request" templates
# remain with broad enrol grants.
PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.