3 minute read

AD CS: Summary of Attack Paths (ESCs)

This post provides an overview of the documented Enterprise Security Configurations (ESCs) that illustrate various attack paths in Active Directory Certificate Services (AD CS). These scenarios demonstrate how misconfigurations or overly permissive settings can be exploited to escalate privileges or maintain persistent access within a Windows domain.


ESC1: Poorly Configured Templates (Broad EKU or Unrestricted)

ESC2: Abuse of the Enrollment Agent Template

ESC3: Subject Alternative Name (SAN) Controlled by the Requester

ESC4: Combination of Enrollment Agent and SAN Control

ESC5: Templates with Overly Permissive EKUs or “Any Purpose”

ESC6: Excessive Permissions on the Template

ESC7: Improper Use of UPN Attributes in Certificates

ESC8: NTLM Relay to AD CS Web Enrollment Endpoints

ESC9: Vulnerable Subordinate or Offline CA Configurations

ESC10: Misuse of Domain Controller Certificate Templates

ESC11: Lack of Validation or Monitoring in Certificate Issuance

ESC12: Poorly Managed Revocation and Expiration

ESC14: Advanced Abuse of Public Key Configurations and Permissions

Updated: