Query Details
// Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293) CVSS 8.8 // https://birkep.github.io/posts/Windows-LPE/ let WindowsServer = DeviceInfo | where DeviceType == "Server" and OSPlatform has "windows" | distinct DeviceName; let DLLLoaded = DeviceEvents | where Timestamp > ago(3h) | where DeviceName has_any (WindowsServer) | where ActionType == @"DriverLoad" | where FileName endswith ".dll" | distinct FileName; DeviceRegistryEvents | where ActionType == @"RegistryKeyCreated" or ActionType == @"RegistryValueSet" | where RegistryValueName has_any(DLLLoaded) or RegistryValueData has_any(DLLLoaded)
This KQL (Kusto Query Language) query is designed to detect potential security vulnerabilities related to the Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293) on Windows servers. Here's a simplified breakdown of what the query does:
Identify Windows Servers:
Track DLL Files Loaded:
Monitor Registry Changes:
In summary, this query is used to monitor for suspicious DLL file loads on Windows servers and any related registry changes, which could indicate an exploitation attempt of the specified vulnerability.

Steven Lim
Released: February 2, 2025
Tables
Keywords
Operators