BadSuccessor (dMSA abuse)
Last updated
Was this helpful?
Last updated
Was this helpful?
In Windows Server 2025, Microsoft introduced delegated Managed Service Accounts (dMSAs). A dMSA is a new type of service account in Active Directory (AD) that expands on the capabilities of group Managed Service Accounts (gMSAs).
If we have GenericAll
, CreateChild
, WriteDACL
, or WriteOwner
permissions on any OUโor can modify an existing dMSA, we can escalate from low-level access to full Domain Admin via the BadSuccessor technique.
Exploiting this vector does not require the domain to actively use dMSAs. The feature is automatically enabled in any domain that includes at least one Windows Server 2025 domain controller, and its presence alone is enough to make the attack path viable.