INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 16h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global insider Cybersecurity Services CRITICAL 18h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 16h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global insider Cybersecurity Services CRITICAL 18h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 10h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 16h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 17h Global phishing Multiple sectors HIGH 17h Global insider Cybersecurity Services CRITICAL 18h
Vulnerabilities

CVE-2014-6324

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Microsoft Kerberos Key Distribution Center (KDC) Privilege Escalation Vulnerability — The Kerberos Key Distribution Center (KDC) in Microsoft allows remote authenticated domain users to obtain domain
Published: Mar 25, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Microsoft Kerberos Key Distribution Center (KDC) Privilege Escalation Vulnerability — The Kerberos Key Distribution Center (KDC) in Microsoft allows remote authenticated domain users to obtain domain administrator privileges.

🤖 AI Executive Summary

CVE-2014-6324 (MS14-068) is a critical Kerberos authentication bypass allowing any authenticated domain user to forge Kerberos tickets and escalate privileges to Domain Administrator. This vulnerability affects legacy Windows Server environments still prevalent in Saudi organizations. With public exploits readily available and active exploitation documented, this represents an immediate threat to Active Directory infrastructures across banking, government, and critical infrastructure sectors.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Mar 23, 2026 20:36
🇸🇦 Saudi Arabia Impact Assessment
Critical impact on Saudi organizations still operating legacy Windows Server 2003-2012 R2 domain controllers. Banking sector (SAMA-regulated institutions) faces severe risk as domain compromise enables unauthorized fund transfers and data exfiltration. Government entities under NCA oversight risk complete network takeover affecting citizen data and critical services. Energy sector (ARAMCO, SEC) infrastructure using Windows authentication vulnerable to operational disruption. Healthcare organizations risk HIPAA-equivalent violations through patient data exposure. Telecom providers (STC, Mobily, Zain) face service disruption and subscriber data compromise. Legacy systems in education sector (universities, MOE) particularly vulnerable due to delayed patching cycles.
🏢 Affected Saudi Sectors
Banking Government Energy Healthcare Telecommunications Education Defense Transportation Utilities
⚖️ Saudi Risk Score (AI)
9.5
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Windows Server 2003, 2008, 2008 R2, 2012, and 2012 R2 domain controllers using network scanning
2. Apply Microsoft Security Bulletin MS14-068 patches immediately:
- KB3011780 for Windows Server 2012 R2
- KB3011780 for Windows Server 2012
- KB3011780 for Windows Server 2008 R2
- KB3011780 for Windows Server 2008
- KB3011780 for Windows Server 2003
3. Reboot all domain controllers after patching
4. Reset krbtgt account password TWICE (wait 10 hours between resets) to invalidate forged tickets
5. Enable advanced Kerberos logging (Event IDs 4768, 4769, 4770, 4771)

DETECTION:
- Monitor for Event ID 4769 with Ticket Encryption Type 0x17 (RC4-HMAC)
- Search for PAC validation failures in domain controller logs
- Deploy Sigma rules for MS14-068 exploitation attempts
- Scan for PyKEK, Kekeo, Metasploit modules in environment

COMPENSATING CONTROLS (if patching delayed):
- Implement strict network segmentation isolating domain controllers
- Enable Protected Users security group for privileged accounts
- Deploy MFA for all administrative access
- Restrict domain user authentication to specific workstations
- Monitor privileged group membership changes (Domain Admins, Enterprise Admins)
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع وحدات التحكم بالنطاق Windows Server 2003-2012 R2 باستخدام المسح الشبكي
2. تطبيق تصحيحات نشرة الأمان MS14-068 من مايكروسوفت فوراً:
- KB3011780 لـ Windows Server 2012 R2
- KB3011780 لـ Windows Server 2012
- KB3011780 لـ Windows Server 2008 R2
- KB3011780 لـ Windows Server 2008
- KB3011780 لـ Windows Server 2003
3. إعادة تشغيل جميع وحدات التحكم بالنطاق بعد التصحيح
4. إعادة تعيين كلمة مرور حساب krbtgt مرتين (انتظر 10 ساعات بين إعادتي التعيين) لإبطال التذاكر المزورة
5. تفعيل تسجيل Kerberos المتقدم (معرفات الأحداث 4768، 4769، 4770، 4771)

الكشف:
- مراقبة معرف الحدث 4769 مع نوع تشفير التذكرة 0x17
- البحث عن فشل التحقق من PAC في سجلات وحدة التحكم بالنطاق
- نشر قواعد Sigma لمحاولات استغلال MS14-068
- فحص البيئة بحثاً عن أدوات PyKEK وKekeo ووحدات Metasploit

الضوابط التعويضية (في حال تأخر التصحيح):
- تطبيق تجزئة شبكية صارمة لعزل وحدات التحكم بالنطاق
- تفعيل مجموعة أمان المستخدمين المحميين للحسابات المميزة
- نشر المصادقة متعددة العوامل لجميع الوصول الإداري
- تقييد مصادقة مستخدمي النطاق على محطات عمل محددة
- مراقبة التغييرات في عضوية المجموعات المميزة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
5-1-1: Vulnerability Management - Critical patch deployment within 15 days 4-1-3: Access Control - Privileged account management 6-1-1: Security Monitoring - Authentication logging and alerting 5-2-1: Security Baseline - Secure configuration of authentication systems 3-1-2: Asset Management - Inventory of authentication infrastructure
🔵 SAMA CSF
CCC-01: Cybersecurity Governance - Risk assessment of authentication systems CCC-04: Vulnerability Management - Patch management for critical systems CCC-06: Access Control - Privileged access management CCC-08: Security Monitoring - Detection of privilege escalation attempts CCC-10: Incident Response - Procedures for authentication compromise
🟡 ISO 27001:2022
A.8.8: Management of technical vulnerabilities A.9.2.3: Management of privileged access rights A.12.6.1: Management of technical vulnerabilities A.16.1.4: Assessment of and decision on information security events A.18.2.3: Technical compliance review
🟣 PCI DSS v4.0
Requirement 6.2: Ensure all systems are protected from known vulnerabilities Requirement 8.3: Secure all individual non-console administrative access Requirement 10.2: Implement automated audit trails for authentication events Requirement 11.2: Run internal and external network vulnerability scans
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Microsoft:Kerberos Key Distribution Center (KDC)
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS88.40%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-04-15
Published 2022-03-25
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.