Heimdal Security Blog

Microsoft’s New Patch Tuesday Updates Causes Windows Kerberos Authentication to Break

An issue that is causing Kerberos sign-in failures has been reported by multiple enterprise domain controllers. The problems appeared after installing updates released during Patch’s Tuesday.

BleepingComputer revealed that readers of their website also reported that Kerberos breaks in situations where they’ve set the “This account supports Kerberos AES 256-bit encryption” or “This account supports Kerberos AES 128-bit encryption” account options.

Microsoft Is Investigating the Problem

The company informed its customers about the issues the Kerberos authentication might encounter after installing the updates released on November 8th, 2022.

When this issue is encountered you might receive a Microsoft-Windows-Kerberos-Key-Distribution-Center Event ID 14 error event in the System section of Event Log on your Domain Controller with the below text.

Source

The phrase “the missing key has an ID of 1” will be used to identify errors that are recorded in the system event logs of impacted systems.

The list of scenarios involving the Kerberos authentication includes, but is not limited to the following:

The problem seems to be affecting both clients and server platforms. The complete list includes:

Microsoft stated that the issue is not an expected result and that they have already started enforcing security hardening for Kerberos and Netlogon. The issue is not going to affect the home customers and those who are not enrolled in an on-premises domain. Additionally, it has no effect on environments using mom-hybrid Azure Active Directory or those without on-premises Active Directory servers.

Microsoft is working on a fix and it is estimated that a solution will be available in the coming weeks.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, Youtube, and Instagram for more cybersecurity news and topics.