Server 2019 update KB5005568 (Sept 2021) forcing new DCOM authentication prematurely

Chuck Badeau 41 Reputation points
2021-09-23T20:40:38.017+00:00

Hi,
We recent applied KB5005568 (Sept 21 update) to one of our Server 2019 DCs. After applying, we started receiving many DCOM error events 10036 (Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application) for a user id function on our Palo Alto FW (It uses a service account to resolve user identification from AD). Having read up on Microsoft's transition to a minimum of Packet Integrity for DCOM authentication (see June's KB5004442 and the DCOM issue described in CVE-2021-26414), it would appear that, at least in Server 2019, this feature has been enabled prematurely (Supposed to be Q1 2022 based on the timeline in the KB5004442) and the described reg entry to temporarily bypass the DCOM update does not work (it is supposed to be valid all of 2022 after the feature is enabled).

Our only solution has been to roll back the patch on our DC. I found one reference to someone else encountering the same. They have mixed OS's for DCs and are only seeing the issue on 2019 (https://www.reddit.com/r/paloaltonetworks/comments/pl5dm7/new_2019_dc_event_log_messages_from_panos_userid/).

Is anyone else seeing this behavior with the pending DCOM update?

First time posting here and really just trying to see if this is on MS's radar at all.

Thanks,
Chuck

Windows Server 2019
Windows Server 2019
A Microsoft server operating system that supports enterprise-level management updated to data storage.
3,448 questions
{count} votes

18 answers

Sort by: Most helpful
  1. Romain 1 Reputation point
    2021-10-15T12:30:19.013+00:00

    Hello all,

    I have the same error on a Windows Server 2016.
    KB5005573 & KB5005698 have been installed. I suppose the problem is with KB5005573.

    Have you found a solution or a workaround to stop errors in the event logs (Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application)?

    Thanks & regards,


  2. Alexander Boes 1 Reputation point
    2021-10-18T13:19:21.013+00:00

    we have exactly the same.
    Windows Terminal Server 2019 10.0.17763.2237
    Office 365 E3 Build: 2102 16.0.13801.21004 32Bit

    Ereignise in System:

    Ereignis1:
    The server-side authentication level policy does not allow the user AD\Administrator SID (S-1-5-21-3123687329-548211103-3594694034-500) from address 192.168.172.4 to activate DCOM server. Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application.

    Ereignis2:
    Ein DCOM-Server konnte nicht gestartet werden: Microsoft.Windows.Cortana_1.11.6.17763_neutral_neutral_cw5n1h2txyewy!CortanaUI.AppXfbn8w4s0jbk3tjevpcn9kaxerc6rby8k.mca als Nicht verfügbar/Nicht verfügbar. Fehler:
    "0"
    Aufgetreten beim Start dieses Befehls:
    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca

    Ereignis3:
    Ein DCOM-Server konnte nicht gestartet werden: Microsoft.AAD.BrokerPlugin_1000.17763.1.0_neutral_neutral_cw5n1h2txyewy!Windows.Security.Authentication.Web.Core.BackgroundGetTokenTask.ClassId.WebAccountProvider als Nicht verfügbar/Nicht verfügbar. Fehler:
    "0"
    Aufgetreten beim Start dieses Befehls:
    "C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider

    Office 365 on the terminal server cannot be activated. Window is there, email address in, window disappears and comes back when Excel hangs up twice.

    bin für jede Lösung offen

    0 comments No comments

  3. Scott Owens 1 Reputation point
    2021-10-29T15:33:53.757+00:00

    I am also seeing this on Windows Server 2019 with Palo Alto User-ID. Is there a patch or fix from Microsoft on this?

    0 comments No comments

  4. Romain 1 Reputation point
    2021-10-29T17:38:18.297+00:00

    Hello all,

    I am experiencing the same problem on Windows Server 2016 with this error message in the events logs (events 10036).
    3 questions in order to fully understand the issue:

    • On the client side, is this an option to be changed at the system level or at the application level? Maybe both (KB deployment + application configuration to raise the authentication level)?
    • If change to be made at system level, do we have an option/workaround for a Windows XP client?
    • It is stated in this link that : To address the vulnerability described in CVE-2021-26414, you must install updates released June 8, 2021 or later and enable the registry key described below in your environment. We recommended that you complete testing in your environment and enable these hardening changes as soon as possible. If you find issues during testing, you must contact the vendor for the affected client or server software for an update or workaround before early 2022.
      Does this mean that in early 2022, by default DCOM servers will apply the Authentication-Level d RPC_C_AUTHN_LEVEL_PKT_INTEGRITY? Will we have a way to prevent this activation if needed?

    Thanks & regards

    0 comments No comments

  5. AzureGuineaPig 1 Reputation point
    2021-11-03T19:01:54.95+00:00

    Also happening on Server 2012R2 domain controller, after installing the October 2021 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB5006714).

    Setting the Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\AppCompat\RequireIntegrityActivationAuthenticationLevel to 0x00000000 and restarting the server, also does not resolve the issue.

    0 comments No comments