The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-17049

CVE-2020-17049: Windows Server 2012 Auth Bypass Flaw

CVE-2020-17049 is an authentication bypass flaw in Windows Server 2012 affecting Kerberos Constrained Delegation. Attackers can exploit KDC validation weaknesses to bypass security controls. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: March 4, 2026

CVE-2020-17049 Overview

A security feature bypass vulnerability exists in the way the Key Distribution Center (KDC) determines if a service ticket can be used for delegation via Kerberos Constrained Delegation (KCD). This vulnerability allows attackers with access to a compromised service configured to use KCD to tamper with service tickets that are not valid for delegation, forcing the KDC to accept them improperly.

To exploit the vulnerability, a compromised service that is configured to use KCD could tamper with a service ticket that is not valid for delegation to force the KDC to accept it. The update addresses this vulnerability by changing how the KDC validates service tickets used with KCD.

Critical Impact

Attackers exploiting this vulnerability can bypass Kerberos security controls to impersonate users and access resources they should not be authorized to reach, potentially leading to full domain compromise in Active Directory environments.

Affected Products

  • Microsoft Windows Server 2012 (including R2)
  • Microsoft Windows Server 2016 (including versions 1903, 1909, 2004, 20H2)
  • Microsoft Windows Server 2019
  • Samba (multiple versions)

Discovery Timeline

  • 2020-11-11 - CVE-2020-17049 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2020-17049

Vulnerability Analysis

This vulnerability targets the Kerberos Constrained Delegation (KCD) mechanism in Microsoft Windows Server environments. KCD is designed to allow services to obtain service tickets on behalf of users to access other services, while constraining which services can be accessed through delegation. The flaw lies in how the Key Distribution Center validates service tickets during the delegation process.

The vulnerability enables an attacker who has already compromised a service account configured with constrained delegation to manipulate service tickets. Specifically, the KDC fails to properly validate whether a service ticket should be allowed for delegation purposes. This improper authorization check (CWE-863) allows attackers to force the KDC to accept tampered tickets that should have been rejected.

Root Cause

The root cause is an improper authorization vulnerability (CWE-863) in the KDC's validation logic. When a service attempts to use a ticket for constrained delegation, the KDC should verify that the ticket is valid for delegation purposes. However, due to insufficient validation, the KDC can be tricked into accepting tickets that have been tampered with or were never intended for delegation use. This represents a fundamental flaw in the security boundary enforcement between service-to-service authentication in Kerberos.

Attack Vector

The attack requires network access and high privileges, specifically requiring the attacker to have already compromised a service account that is configured to use Kerberos Constrained Delegation. The attack unfolds as follows:

  1. The attacker first compromises a service account that has KCD permissions configured
  2. The attacker obtains a service ticket that is not valid for delegation (e.g., a ticket with the forwardable flag not set)
  3. The attacker tampers with the service ticket to make it appear valid for delegation
  4. The attacker presents this tampered ticket to the KDC
  5. Due to insufficient validation, the KDC accepts the ticket and issues a new service ticket for the target service
  6. The attacker can now access the target service while impersonating the victim user

This attack is particularly dangerous in Active Directory environments where constrained delegation is commonly used for multi-tier applications and service-to-service authentication.

Detection Methods for CVE-2020-17049

Indicators of Compromise

  • Unusual Kerberos ticket requests originating from services configured with constrained delegation
  • Service tickets being used for delegation that should not have the delegation flag set
  • Anomalous access patterns from service accounts to resources outside their normal scope
  • Kerberos authentication events with mismatched or unexpected ticket flags in Windows Security Event Logs

Detection Strategies

  • Monitor Windows Security Event Logs for Event ID 4769 (Kerberos Service Ticket Operations) and look for anomalies in delegation patterns
  • Audit service accounts configured with constrained delegation and their access patterns to detect potential abuse
  • Implement network traffic analysis to identify unusual Kerberos traffic patterns between domain controllers and service endpoints
  • Use SentinelOne's behavioral AI to detect suspicious authentication sequences that deviate from baseline behavior

Monitoring Recommendations

  • Enable advanced Kerberos logging on domain controllers to capture detailed delegation activity
  • Create alerts for service accounts accessing resources outside their constrained delegation scope
  • Regularly review and audit which service accounts have KCD configured and whether those configurations are still necessary
  • Monitor for multiple failed and successful authentication attempts from the same service account in rapid succession

How to Mitigate CVE-2020-17049

Immediate Actions Required

  • Apply the Microsoft security update for CVE-2020-17049 immediately on all affected Windows Server versions
  • Audit all service accounts with Kerberos Constrained Delegation configured and reduce permissions where possible
  • Review and restrict which services are allowed to use constrained delegation
  • Consider migrating to Resource-Based Constrained Delegation (RBCD) which provides more granular control

Patch Information

Microsoft has released security updates to address this vulnerability. The patches modify how the KDC validates service tickets used with Kerberos Constrained Delegation. Organizations should apply the updates available through the Microsoft Security Advisory CVE-2020-17049.

For Samba deployments, administrators should consult the Gentoo GLSA 2023-06 and the OpenWall OSS-Security Mailing List for applicable patches and guidance.

Workarounds

  • Disable Kerberos Constrained Delegation on services where it is not strictly required
  • Implement the principle of least privilege by limiting which services can be accessed through delegation
  • Use Protected Users security group for high-value accounts to prevent their credentials from being delegated
  • Segment network access to limit the impact of a potential compromise
bash
# Review services with constrained delegation configured
# PowerShell command to identify accounts with constrained delegation
Get-ADObject -Filter {msDS-AllowedToDelegateTo -like "*"} -Properties msDS-AllowedToDelegateTo, userAccountControl | Select-Object Name, msDS-AllowedToDelegateTo

# Check for accounts trusted for delegation
Get-ADUser -Filter {TrustedForDelegation -eq $true} -Properties TrustedForDelegation | Select-Object Name, TrustedForDelegation

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechWindows

  • SeverityHIGH

  • CVSS Score7.2

  • EPSS Probability26.70%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-863
  • Technical References
  • OpenWall OSS-Security Mailing List

  • Gentoo GLSA 2023-06
  • Vendor Resources
  • Microsoft Security Advisory CVE-2020-17049
  • Related CVEs
  • CVE-2026-32225: Windows Shell Auth Bypass Vulnerability

  • CVE-2026-32220: Windows VBS Enclave Auth Bypass Flaw

  • CVE-2026-32202: Windows Shell Auth Bypass Vulnerability

  • CVE-2026-32072: Windows Active Directory Auth Bypass Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English