Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Frequently Asked Questions About BadSuccessor



Tenable Research Advisory banner with a blue gradient background, featuring the Tenable logo and the text 'ADVISORY' and 'FREQUENTLY ASKED QUESTIONS.' This is an FAQ blog on BadSuccessor,  a zero-day privilege escalation vulnerability in Active Directory domains with at least one Windows Server 2025 domain controller.

Frequently asked questions about “BadSuccessor,” a zero-day privilege escalation vulnerability in Active Directory domains with at least one Windows Server 2025 domain controller.

Update August 12: The blog has been updated to reflect the availability of patches for BadSuccessor as part of Microsoft's August 2025 Patch Tuesday release.

View Change Log

Background

Tenable’s Research Special Operations (RSO) and the Identity Content team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding a newly disclosed zero-day in Active Directory called BadSuccessor.

FAQ

What is BadSuccessor?

BadSuccessor is the name of a zero-day privilege escalation vulnerability in Active Directory that was discovered and disclosed by Yuval Gordon, a security researcher at Akamai.

According to Gordon, the flaw exists in delegated Managed Service Accounts (dMSAs), a service account type in Active Directory (AD) that was introduced in Windows Server 2025 to enable the migration of non-managed service accounts.

What are the vulnerabilities associated with BadSuccessor?

At the time this blog post was published on June 2, there was no CVE identifier assigned for BadSuccessor. However, on August 12, as part of its August 2025 Patch Tuesday, Microsoft assigned a CVE identifier for BadSuccessor:

CVEDescriptionCVSSv3
CVE-2025-53779Windows Kerberos Elevation of Privilege Vulnerability (“BadSuccessor”)7.2

How is BadSuccessor exploited?

To exploit BadSuccessor, an attacker needs to be able to access a user account with specific permissions in AD, and at least one domain controller in the domain needs to be running Windows Server 2025.

Based on Akamai’s research, even if an AD domain is not using dMSAs, nor operates at the 2025 functional level, all that is required is that a targeted user has either the permission to:

  • Create a new dMSA (msDS-DelegatedManagedServiceAccount object class) in any container or organizational unit (OU)
  • Abuse an existing dMSA by modifying its msDS-ManagedAccountPrecededByLinkattribute

When was BadSuccessor first disclosed?

On May 21, Akamai published a blog post about BadSuccessor, which included a detailed overview of the flaw, as well as detection and mitigation guidance.

How severe is BadSuccessor?

BadSuccessor has the potential to be very severe, as exploitation could allow an attacker to achieve full domain, and then forest, compromise in an Active Directory environment. However, one mitigating factor is that it only affects domains with at least one Windows Server 2025 domain controller.

How prevalent are AD domains with at least one Windows Server 2025 domain controller?

Based on a subset of Tenable’s telemetry data, we found just 0.7% of AD domains have at least one Windows Server 2025 domain controller. This appears to be lower than other statistics we’ve seen reported.

Was BadSuccessor exploited as a zero-day?

As of June 2, there have been no indications that BadSuccessor has been exploited in the wild.

Why is it called BadSuccessor?

According to Gordon, the name “BadSuccessor” is tied to the fact that the user account (or dMSA) becomes the nefarious “successor” by inheriting the elevated privileges of another identity in the AD environment.

Is there a proof-of-concept (PoC) available for BadSuccessor?

Yes, there are several proofs-of-concept (PoCs) for BadSuccessor available on GitHub, including a.NET implementation called SharpSuccessor. It is also available in NetExec, the successor to the infamous CrackMapExec hack tool. It was also added to BloodyAD, the Active Directory privilege escalation framework.

Are patches or mitigations available for BadSuccessor?

At the time this blog post was published on June 2, there were no patches available for BadSuccessor. However, on August 12, Microsoft patched BadSuccessor as part of its August 2025 Patch Tuesday release.

Akamai’s blog post includes details on detecting BadSuccessor as well as mitigation suggestions.

Has Tenable released any product coverage for these vulnerabilities?

A list of Tenable plugins for these vulnerabilities can be found on the CVE page for CVE-2025-53779 as they’re released. This link will display all available plugins for these vulnerabilities, including upcoming plugins in our Plugins Pipeline.

Prior to Microsoft assigning CVE-2025-53779 and publishing patches for BadSuccessor on August 12, we published a Tenable Identity Exposure Indicator of Exposure (IoE) for BadSuccessor, which customers can still utilize today. 

 

A screenshot showing Tenable Identity Exposure indicator of exposure (IoE) for BadSuccessorAdditional screenshots from Tenable Identity Exposure for the indicator of exposure (IoE) for BadSuccessor 

Get more information

Change Log

Update August 12: The blog has been updated to reflect the availability of patches for BadSuccessor as part of Microsoft's August 2025 Patch Tuesday release.

Join Tenable's Research Special Operations (RSO) Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.