An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
Kerberoasting attacks let hackers steal service account passwords and escalate to domain admin, often without triggering ...