URL has been copied successfully!
New Kerberos Relay Technique Exploits DNS CNAMEs to Bypass Existing Defenses
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

New Kerberos Relay Technique Exploits DNS CNAMEs to Bypass Existing Defenses

A critical vulnerability in Windows Kerberos authentication that enables attackers to conduct credential-relay attacks by exploiting DNS CNAME records. Tracked as CVE-2026-20929, this flaw allows threat actors to force victims into requesting Kerberos service tickets for attacker-controlled systems, facilitating lateral movement and privilege escalation even when NTLM authentication is entirely disabled. CVE ID Vulnerability Name […] The post New Kerberos Relay Technique Exploits DNS CNAMEs to Bypass Existing Defenses appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

First seen on gbhackers.com

Jump to article: gbhackers.com/new-kerberos-relay-technique-exploits-dns-cnames-to-bypass-existing-defenses/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link