AddMember
Summary
FSProtect ACL Alias
AddMember
AD Alias
Write Members
Affected Object Types
Group
Exploitation Certainty
Certain
AD Attribute
Members
AD Attribute GUID
bf9679c0-0de6-11d0-a285-00aa003049e2
AD Right
WriteProperty
Description
The AddMember permission allows an object (user, group, computer, etc.) to be added as a member of a group in Active Directory, which simplifies management of group memberships. This permission is implemented via the Write Members (WriteProperty) Access Control Entry (ACE).
If this permission is misconfigured, it can introduce a serious vulnerability. An attacker could exploit AddMember by using the Add-ADGroupMember command or equivalent LDAP/ADWS requests to add themselves or other accounts to a domain group, enabling unauthorized access, privilege escalation, and persistence.
Identification
PowerShell
Active Directory Module
Using the ActiveDirectory PowerShell module, you can enumerate AddMember entries.
1. Find-AddMember function
2. Scan all groups in the domain
3. Scan a specific object
4. Use SearchBase to limit the search scope
.NET Directory Services
By leveraging PowerShell’s built-in .NET DirectoryServices namespace, you can enumerate AddMember entries without relying on any external modules or dependencies.
1. Find-AddMemberSimple function
2. Scan all groups in the domain
3. Scan a specific object
Active Directory Users and Computers
1. Open Active Directory Users and Computers on your Windows server.
2. Right-click on the Group name.
3. Select Properties from the context menu.
4. In the Properties window, navigate to the Security tab.
5. Click on the Advanced button to open the Advanced Security Settings dialog.
6. In the Advanced Security Settings window, locate and select the relevant Access Control Entry (ACE) for the user or group you wish to configure.
7. Click Edit to modify the selected ACE.
8. In the permissions list, locate and check the option Write Members.
9. Click OK to save your changes and close the dialogs.

Exploitation
Vulnerabilities related to Access Control Entries can be exploited through LDAP and ADWS requests. The Add-ADGroupMember cmdlet in the ActiveDirectory module can be used to automate this exploitation process.
Windows
Example:

Linux
Add group member using bloodyAD
Example:

Mitigation
Access Control Entries that are identified as dangerous should be removed or corrected by following the steps below.
1. Open Active Directory Users and Computers and enable "Advanced Features".
2. Double-click the affected object and open the Security tab.
3. Click the Advanced button to open the Advanced Security Settings dialog.
4. Edit or remove the ACE(s) that grant the dangerous permissions.
5. Click Apply, then OK to save your changes.

Detection
Monitoring for abuse of the AddMember permission involves correlating group membership changes with ACL modifications on the member attribute. The following Windows Security Event IDs are particularly useful:
4728
Security Group Management
A member was added to a security-enabled global group
Target Group, Member SID/Name
https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4728
4732
Security Group Management
A member was added to a local security group.
Target Group, Member SID/Name
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4732
5136
Audit Directory Service Changes
A directory service object was modified.
ntSecurityDescriptor
https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5136
4662
Audit Directory Service Access
An operation was performed on an object.
AccessList, AccessMask
https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662
References
Last updated
Was this helpful?