Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NDES certificate template #15

Open
AlphonseBa opened this issue Mar 22, 2024 · 2 comments
Open

NDES certificate template #15

AlphonseBa opened this issue Mar 22, 2024 · 2 comments

Comments

@AlphonseBa
Copy link

Bonjour,

Je rencontre un problème avec cette vulnérabilité vuln1_adcs_template_auth_enroll_with_name,

Nous avons mis en place un SCEP NDES qui nécessite by design d'avoir un Template autorisant que le compte SCEP NDES puisse fournir le sujet du certificat.

image

Je ne trouve pas à ce jour de solution pour que mon service continue de fonctionner correctement et de pouvoir re-passer en niveau 3.

Merci beaucoup d'avance
Cordialement

@jbgalet
Copy link

jbgalet commented Mar 25, 2024

Bonjour,

La mitigation générale pour cette vulnérabilité consiste soit:

  • à retirer la CA associée du conteneur NTAuthCertificates, rendant ainsi la CA non utilisable pour l'authentification AD
  • à retirer les EKU problématiques (Client Authentication, PKINIT Client Authentication, Smart Card Logon, Any Purpose)

Pour une réponse contextualisée sur votre AD, il est préférable de contacter l'adresse de contact ANSSI pour le service ADS.

@DannyPans
Copy link

DannyPans commented Apr 17, 2024

Hi AlphonseBa,

We had the same issue and fixed it by applying "secure" permission on the privileged account through Set-ADSyncRestrictedPermissions
More info in your ANSSI report: vuln_adcs_template_auth_enroll_with_name > Recommended measure > Option 3: the delegation is too large > Risk Acceptance
Once you've applied the secure permissions, the privileged account (NDES server and Technical account) will appear at the bottom of your ANSSI report in the Information section [BETA] Additional Tier 0 accounts - info_t0 and the L1 issue will be removed from your report ;-)

Danny

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants