Introduction
The release of the Metasploit Wrap-Up for 04/10/2026 signals a significant shift in the accessibility of high-impact attack vectors. Rapid7 has introduced modules targeting critical enterprise infrastructure: Active Directory Certificate Services (AD CS) via the Web Enrollment interface and Cisco Catalyst SD-WAN controllers.
For defenders, this is not just a software update; it is an intelligence indicator. When an exploit is added to Metasploit, the barrier to entry for attackers drops dramatically. The admin/http/web_enrollment_cert module, in particular, automates a long-standing abuse of AD CS, allowing attackers to forge legitimate credentials and bypass standard authentication controls. If your organization uses AD CS or manages SD-WAN edges, your exposure window has effectively closed. Immediate action is required to detect abuse and harden configurations.
Technical Analysis
1. AD CS Authenticated Web Enrollment Services Module
- Module Path:
admin/http/web_enrollment_cert - Affected Component: Microsoft Active Directory Certificate Services (AD CS) - Certificate Authority Web Enrollment role.
- Attack Mechanics:
- This module exploits misconfigurations in the Web Enrollment service (typically accessible via
/certsrv/or/certenroll/). - It automates the process of requesting a certificate on behalf of a user (often a privileged user like a Domain Admin) if the certificate template allows for "Enrollment" rights by low-privileged users or lacks proper approval workflows.
- Specifically, it targets the ESC8 (AD CS Abuse) vulnerability vector or similar misconfigurations where the Certificate Authority does not properly validate the requester's identity against the requested Subject.
- Impact: Successful exploitation yields a valid X.509 certificate. This certificate can be used for authentication via PKINIT (Kerberos) or Schannel, effectively granting the attacker persistent, privileged access that is extremely difficult to distinguish from legitimate administrator activity.
- This module exploits misconfigurations in the Web Enrollment service (typically accessible via
2. Cisco Catalyst SD-WAN Controller Exploitation
- Affected Products: Cisco Catalyst SD-WAN Controllers (vManage).
- Attack Mechanics:
- The new Metasploit modules target vulnerabilities in the management interface of SD-WAN controllers.
- These devices often sit at the network perimeter, acting as the central orchestration point for wide-area networks.
- Exploitation typically involves authentication bypass, command injection via API endpoints, or deserialization flaws, leading to Remote Code Execution (RCE) as the root or admin user.
- Exploitation Status: While specific CVEs are not detailed in the wrap-up summary, the inclusion in Metasploit confirms the existence of reliable Proof-of-Concept (PoC) code. Active scanning for exposed management interfaces is expected to increase immediately.
3. Windows Service-for-User (S4U) Persistence
- Module Update: Improvements to Windows service-for-user persistence.
- Mechanism: This likely leverages
S4U2ProxyorS4U2Selfextensions to allow a service to impersonate a user or obtain a service ticket on behalf of a user without their password, often utilized for "Kerberoasting" variants or silver ticket attacks. The update improves the ability to query related services, streamlining the post-exploitation data stream.
Detection & Response
The addition of these modules to Metasploit requires a shift in defensive monitoring. We must monitor for the specific artifacts left by the Web Enrollment exploitation attempts and anomalies on SD-WAN infrastructure.
---
title: Potential AD CS Web Enrollment Abuse via Metasploit
id: a1b2c3d4-5678-4980-8a1b-2c3d4e5f6789
status: experimental
description: Detects potential exploitation of AD CS Web Enrollment interface characterized by specific HTTP POST patterns and the presence of Metasploit user agents or suspicious certificate request parameters.
references:
- https://attack.mitre.org/techniques/T1649/
- https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-10-2026
author: Security Arsenal
date: 2026/04/10
tags:
- attack.credential_access
- attack.t1649
- attack.initial_access
logsource:
category: web
product: iis
detection:
selection:
cs_method: 'POST'
cs_uri_stem|contains:
- '/certsrv/certfnsh.asp'
- '/certsrv/certnew.cer'
- '/certenroll/'
filter_legit:
cs_user_agent|contains:
- 'Microsoft-CryptoAPI'
- 'Mozilla'
condition: selection and not filter_legit
falsepositives:
- Legacy clients or custom enrollment scripts
level: high
---
title: Cisco SD-WAN Controller Command Injection Attempt
id: b2c3d4e5-6789-4080-9b2c-3d4e5f6a7890
status: experimental
description: Detects potential command injection attempts against Cisco SD-WAN vManage interfaces, often exploited by Metasploit modules targeting API endpoints.
references:
- https://attack.mitre.org/techniques/T1190/
author: Security Arsenal
date: 2026/04/10
tags:
- attack.initial_access
- attack.execution
- attack.t1190
logsource:
category: web
product: cisco
detection:
selection_uri:
cs_uri_path|contains:
- '/dataservice/'
- '/j_security_check'
selection_payload:
cs_uri_query|contains:
- ';'
- '|'
- '&&'
- '`'
condition: selection_uri and selection_payload
falsepositives:
- Misconfigured monitoring probes (rare)
level: critical
KQL (Microsoft Sentinel / Defender)
Hunt for suspicious certificate issuance events and web interface attacks.
// Hunt for AD CS Web Enrollment anomalies on the CA Server or Web Proxy
SecurityEvent
| where EventID in (4768, 4769, 4886, 4887)
| where ServiceName contains "CERT"
| project TimeGenerated, Computer, TargetUserName, ServiceName, Status
| join kind=inner (
Syslog
| where Facility contains "local"
| where ProcessName contains "nginx" or ProcessName contains "httpd"
| parse Message with * "POST " RequestPath " " *
| where RequestPath contains "/certsrv/" or RequestPath contains "/certenroll/"
) on $left.Computer == $right.Computer
| summarize count() by bin(TimeGenerated, 5m), Computer, TargetUserName, RequestPath
;
// Hunt for Cisco SD-WAN exploitation indicators in CEF/Syslog
CommonSecurityLog
| where DeviceVendor == "Cisco"
| where DeviceProduct == "Catalyst" or DeviceProduct contains "SD-WAN"
| where RequestURL contains "/dataservice/" or RequestURL contains "/j_security_check"
| where RequestContext contains ";" or RequestContext contains "|" or RequestContext contains "&&"
| project TimeGenerated, DeviceAddress, SourceIP, RequestURL, RequestMethod, RequestContext
| sort by TimeGenerated desc
Velociraptor VQL
Hunt for evidence of Metasploit interaction or the resulting persistence mechanisms on Windows endpoints.
-- Hunt for processes spawned by Metasploit or related to AD CS abuse
SELECT Pid, Name, CommandLine, Exe, Username, CreateTime
FROM pslist()
WHERE Name =~ "msfvenom"
OR Name =~ "meterpreter"
OR Name =~ "powershell.exe" AND CommandLine =~ "certutil"
OR Name =~ "rundll32.exe" AND CommandLine =~ "pkinit";
-- Hunt for suspicious service creation (S4U Persistence)
SELECT Name, DisplayName, BinaryPath, StartType, ServiceType, Modified
FROM win_service_get()
WHERE DisplayName =~ "service-for-user"
OR BinaryPath =~ "powershell"
AND Modified > now() - 7d
Remediation Script (PowerShell)
Use this script to audit AD CS templates for dangerous configurations that the Metasploit module exploits.
# Audit AD CS Templates for Web Enrollment Misconfigurations
Write-Host "[*] Initiating AD CS Security Audit..." -ForegroundColor Cyan
# Check for ADCS Deployment
try {
$CAInfo = Get-ADObject -Filter "objectClass -eq 'pKIEnrollmentService'" -Property * -ErrorAction Stop
if (-not $CAInfo) {
Write-Host "[!] No Active Directory Certificate Services found." -ForegroundColor Yellow
exit
}
Write-Host "[+] Found CA: $($CAInfo.Name)" -ForegroundColor Green
} catch {
Write-Host "[!] Error querying AD for CA: $_" -ForegroundColor Red
exit
}
# Identify Vulnerable Templates (ESC1/ESC8 logic)
$VulnerableTemplates = @()
$Templates = Get-CATemplate | Where-Object { $_.Property -notlike "*ENROLLEE_SUPPLIES_SUBJECT*" } # Simplified check
foreach ($Template in $Templates) {
# Check if template allows 'Authenticated Users' to enroll
$acl = (Get-Acl "AD:\CN=$($Template.Name),CN=Certificate Templates,CN=Public Key Services,CN=Services,$((Get-ADRootDSE).configurationNamingContext)").Access
$EnrollRights = $acl | Where-Object { $_.IdentityReference -eq "Authenticated Users" -and $_.AccessControlType -eq "Allow" -and $_.ObjectType -eq "0e10c968-78fb-11d2-90d4-00c04f79dc55" } # Enroll GUID
if ($EnrollRights) {
Write-Host "[!] VULNERABLE: Template '$($Template.Name)' allows 'Authenticated Users' to enroll." -ForegroundColor Red
$VulnerableTemplates += $Template.Name
}
}
if ($VulnerableTemplates.Count -eq 0) {
Write-Host "[+] No high-risk misconfigurations detected in common templates." -ForegroundColor Green
} else {
Write-Host "[!] Remediation Required for: $($VulnerableTemplates -join ', ')" -ForegroundColor Red
Write-Host " Action: Remove 'Authenticated Users' from Enrollment ACLs or disable the template." -ForegroundColor White
}
Remediation
Active Directory Certificate Services (AD CS)
- Restrict Template ACLs: Immediately audit the "Enroll" and "Auto-Enroll" permissions on all certificate templates. Remove "Authenticated Users" and "Domain Users" from templates that allow for client authentication (EKU: 1.3.6.1.5.5.7.3.2).
- Disable Web Enrollment (If Unnecessary): If the Web Enrollment role service is not strictly required for business operations, disable it on the CA.
- Implement Template Hardening: Ensure templates configured for "Any Purpose" or "Client Authentication" require Manager Approval and have the "Authorized Signature" flag set where possible.
Cisco Catalyst SD-WAN
- Patch Immediately: Review the Cisco Security Advisories related to Catalyst SD-WAN controllers released prior to April 2026. Apply the latest stable firmware updates that address arbitrary command execution and authentication bypass flaws.
- Network Segmentation: Ensure SD-WAN management interfaces (vManage) are not accessible from the public internet. Enforce strict Zero Trust Network Access (ZTNA) policies for administrative access.
- Review Local Accounts: Audit the SD-WAN controller for unauthorized local administrative accounts created during potential exploitation.
General
- Monitor for Persistence: Hunt for S4U (Service-for-User) abuse by monitoring for Kerberos
TGS_REQevents where Service Ticket requests include a "Forwardable" flag but originate from non-standard services.
Related Resources
Security Arsenal Penetration Testing Services AlertMonitor Platform Book a SOC Assessment vulnerability-management Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.