- Grant CA Officer (ManageCertificates) and approve a denied certificate request
- Publish a certificate template (e.g. one that enables an ESC1 condition)
- Grant Enroll on the enterprise CA
- Enable the ESC6 CA flag
EDITF_ATTRIBUTESUBJECTALTNAME2
- Disable the ESC11 enforcement flag
IF_ENFORCEENCRYPTICERTREQUEST
(weakens RPC enrollment security; enables relay) - Disable the security extension on the enterprise CA (ESC16)
- Abuse a CRL Distribution Point (CDP) to coerce and relay the CA server
- Abuse a CDP to obtain RCE on the CA server (e.g., via web shell)
Abuse Info
This relationship alone is not automatically a privilege escalation; however, it frequently enables one of several ADCS escalation paths when combined with template / CA configuration weaknesses.1. Grant CA Officer and Approve a Denied Request
Role separation (when enabled) prevents a single principal from holding both ManageCA and ManageCertificates, but this configuration is rare. Windows Grant the CA Officer (ManageCertificates) role with Certify (v2.0):2. Publish a Certificate Template
Windows Publish/unpublish a template (e.g. enabling ESC1):3. Grant Enroll on Enterprise CA
Windows Grant or revoke CA enrollment rights (required for certificate issuance):4. Enable ESC6 Flag EDITF_ATTRIBUTESUBJECTALTNAME2
Windows
Toggle the flag:
5. Disable ESC11 Flag IF_ENFORCEENCRYPTICERTREQUEST
Windows
Toggle the flag:
6. Disable Security Extension (ESC16)
Windows Set CA settings for ESC16:7 & 8. Abuse CDP for Coercion / RCE
Techniques to coerce & relay or achieve RCE via CDP manipulation are described here: AD CS: from ManageCA to RCEOpsec Considerations
Abusing these capabilities commonly results in certificate issuance; issued certificates (and sometimes pending requests) leave artifacts on the CA host. Enabling/disabling flags or publishing templates may generate observable administrative events and typically requires a CA service restart for certain changes (ESC6, ESC11, ESC16) to take effect.Edge Schema
Source: User, Group, ComputerDestination: EnterpriseCA
Traversable: Yes