Microsoft confirms Patch Tuesday patch May 2022 causes AD authentication error
After installing the update, Windows admins reported that some policies were faulty. The error message is as follows: "Authentication failed due to a user credentials mismatch. Either the user name provided does not map to an existing account or the password was incorrect".
This issue affects Windows platforms and systems for clients and servers running all versions of Windows, including the latest available releases (Windows 11 and Windows Server 2022).
Microsoft says this error is only triggered after installing updates on a server used as a domain controller. Updates will have no negative impact when deployed on Windows client and server devices other than Windows Server domain controllers.
"After installing the updates released on 5/10/2022 on your domain controller, you may see authentication errors on the server or client for services like Network Policy Server (NPS), Routing and Remote access Service (RRAS), Radius, Extensible Authentication Protocol (EAP) and Protected Extensible Authentication Protocol (PEAP)", Microsoft shared.
Currently, Microsoft is investigating this issue and will release an update to address it in the near future.
In another support document, Microsoft said it was the patches CVE-2022-26931 and CVE-2022-26923 that caused the AD authentication problem. These are two elevated privilege vulnerabilities in Windows Kerberos and Active Directory Domain Services.
CVE-2022-26923 is a critical vulnerability that allows an attacker to elevate the privileges of a low-level account to an administrator account on default Active Directory configurations.
For the time being, users can work around it by manually mapping the certificate to the machine account in Active Directory.
In the May update, Microsoft also automatically added the Registry key StrongCertificateBindingEnforcement. This key will change the execution mode of the Kerberos Distribution Center (KDC) to Compatibility mode (this will allow all authentication unless the certificate is older than the user).
However, one administrator said that the only way some of their users could log in was to disable StrongCertificateBindingEnforcement by setting its value to 0.
If you don't find this key in Registry Editor, you can manually generate it with the REG_DWORD data type and set it to 0. This will disable the strong certificate mapping check. While this isn't a solution Microsoft recommends, it's the only way people can sign in.
Last November, Microsoft also fixed Windows Server authentication errors related to Kerberos authorization scenarios affecting Domain Controllers (DCs) via emergency updates.
You should read it
- Error 0x80245006 during Windows 7, 8 and 10 update, this is how to fix the problem
- Some Windows 10 machines are locked to update after updating KB5003214 and KB5003690
- How to fix Windows Update error
- 5 most common Windows errors and this is a fix
- Steps to fix error 0x803fa067 when Active Windows
- How to fix a blank screen error after updating Windows 10 April 2018 Update
- How to fix Windows Update error code 0x80240fff in Windows 10
- Windows Update June 2022 continues to cause many annoying bugs
May be interested
- Microsoft fixes 61 vulnerabilities in latest Windows updatemicrosoft has released its monthly security update patch tuesday to fix 61 vulnerabilities across many software suites for windows.
- Microsoft patched 15 bugs, continued to patch SSL certificatesmicrosoft finally released an update patch after 4 days of detailed information leakage.
- Microsoft releases urgent patch for printer error emergency patchthe patch for microsoft's printer vulnerability on windows again caused an error, forcing the company to issue another urgent patch.
- Microsoft released an updated patch for 25 critical security holesas part of august patch tuesday, microsoft yesterday announced the release of 48 security updates for all supported windows operating systems and other products.
- Microsoft is preparing to release a series of new security holesmicrosoft will release 12 new critical security patches to fix 57 security holes on all its software on tuesday (february 12). this will be the largest patch in the past few months.
- Users should update Windows immediately to fix 33 vulnerabilitiesmicrosoft has just released the final patch tuesday patch for 2023 to fix 33 vulnerabilities, and recommends that users update windows immediately.
- Microsoft releases Windows 10 update KB5006670 to fix taskbar errorsmicrosoft has just released the windows 10 routine patch tuesday (patch tuesday) update kb5006670.
- Microsoft confirmed that Windows 10 encountered many annoying errors after updatingrecent cumulative updates and also the december 2022 patch tuesday update have caused many problems for windows 10.
- Microsoft releases urgent patches for VPN bugs and nasty Windows Server bugsafter more than a week of trying to fix it, microsoft has recently released a patch for the issues of the january 2022 patch tuesday update.
- Microsoft released critical patches that existed from Windows 95in this november patch tuesday, microsoft has released a record number of patches since 2013. in particular, one of them exists from the 19-year-old windows 95 operating system.