Server 2019 update KB5005568 (Sept 2021) forcing new DCOM authentication prematurely

Chuck Badeau 41 Reputation points
2021-09-23T20:40:38.017+00:00

Hi,
We recent applied KB5005568 (Sept 21 update) to one of our Server 2019 DCs. After applying, we started receiving many DCOM error events 10036 (Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application) for a user id function on our Palo Alto FW (It uses a service account to resolve user identification from AD). Having read up on Microsoft's transition to a minimum of Packet Integrity for DCOM authentication (see June's KB5004442 and the DCOM issue described in CVE-2021-26414), it would appear that, at least in Server 2019, this feature has been enabled prematurely (Supposed to be Q1 2022 based on the timeline in the KB5004442) and the described reg entry to temporarily bypass the DCOM update does not work (it is supposed to be valid all of 2022 after the feature is enabled).

Our only solution has been to roll back the patch on our DC. I found one reference to someone else encountering the same. They have mixed OS's for DCs and are only seeing the issue on 2019 (https://www.reddit.com/r/paloaltonetworks/comments/pl5dm7/new_2019_dc_event_log_messages_from_panos_userid/).

Is anyone else seeing this behavior with the pending DCOM update?

First time posting here and really just trying to see if this is on MS's radar at all.

Thanks,
Chuck

Windows Server 2019
Windows Server 2019
A Microsoft server operating system that supports enterprise-level management updated to data storage.
3,456 questions
{count} votes

18 answers

Sort by: Most helpful
  1. Penny Bristow 6 Reputation points
    2021-11-04T21:07:26.99+00:00

    I have an old dc 2012 R2 and am also seeing it as it was also in the Oct 14th patch

    0 comments No comments

  2. Alex 1 Reputation point
    2021-11-10T02:12:12.463+00:00

    Hey all,

    For anyone still seeing this issue, you have to make sure both the server doing the scanning and the server being scanned are both up to September or newer patch. If you updated your DC's but the server or collector scanning them is not patched, it will generate these errors. Updating both sides to September or newer patch should fix it.

    Thanks


  3. Manish Chaudhary 6 Reputation points
    2022-02-03T20:41:05.94+00:00

    This isn't an issue only with Server 2019 but with all 2012 R2 and above. 2019 was observed first coz the update or patch was released for it in Sep2021 and 2012 R2 in Oct 2021 CU.

    Don't do registry changes recommended here, that will just bring back the issue in consecutive patches as this is a needed security patch of a vulnerability and Server hardening done by Microsoft. WMI hardening in effect is optional until March 2022, and by June 2022, you cant change it, it will again cause the same issues and flaring Event logs in System on all Windows server.

    You've to go to your vendor who is using WMI to poll servers for Event logs, to give you either WinRM Over Http, WInRM over Http using Kerberos for encryption as well, WinRM over Https using kerberos etc methods.

    Here is a nice article from users from Palo Alto vendor which highlights the issue and what consumers have tried so far to resolve it. Registry fixing is very temporary.
    https://live.paloaltonetworks.com/t5/general-topics/i-am-having-pan-os-integarted-user-id/td-p/439686

    0 comments No comments