Microsoft to deprecate vulnerable RC4 cipher by mid-2026

Microsoft will disable the obsolete RC4 encryption cipher in Windows Active Directory by mid-2026, addressing decades of security vulnerabilities. The move follows criticism over its role in major hacks, including last year's Ascension breach affecting 140 hospitals. Administrators must now audit networks for lingering RC4 use.

Microsoft has supported the weak RC4 cipher by default in Windows for 26 years, since introducing Active Directory in 2000. RC4, developed by Ron Rivest in 1987, faced a major cryptographic attack shortly after its 1994 leak, yet persisted in protocols like SSL and TLS until about a decade ago.

Despite upgrading to the secure AES standard, Windows servers continued to fallback to RC4 for authentication requests, enabling attacks like Kerberoasting, known since 2014. This vulnerability contributed to the Ascension health breach, disrupting services at 140 hospitals and exposing 5.6 million patients' records.

In September, US Senator Ron Wyden urged the Federal Trade Commission to probe Microsoft for "gross cybersecurity negligence" due to ongoing RC4 support.

Last week, Microsoft announced deprecation of RC4. "By mid-2026, we will be updating domain controller defaults for the Kerberos Key Distribution Center (KDC) on Windows Server 2008 and later to only allow AES-SHA1 encryption," wrote principal program manager Matthew Palko. "RC4 will be disabled by default and only used if a domain administrator explicitly configures an account or the KDC to use it."

AES-SHA1, available since Windows Server 2008, uses iterated hashing and salt, making it about 1,000 times harder to crack than RC4's unsalted, single-round MD4 implementation.

To aid transition, Microsoft offers updated KDC logs and PowerShell scripts to detect RC4 usage, crucial for legacy third-party systems. Steve Syfuhs, of Microsoft's Windows Authentication team, noted on Bluesky the challenges: "The problem though is that it’s hard to kill off a cryptographic algorithm that is present in every OS that’s shipped for the last 25 years."

Over the past decade, Microsoft reduced RC4 usage significantly through incremental changes, dropping it to near zero without widespread breakage.

Related Articles

Microsoft has released an emergency patch for a high-severity vulnerability in its ASP.NET Core framework, affecting macOS and Linux applications. Tracked as CVE-2026-40372, the flaw allows unauthenticated attackers to gain SYSTEM privileges through forged authentication payloads. The company advises immediate updates and key rotation to fully mitigate risks.

Reported by AI

Building on 2026 qubit reductions like Iceberg Quantum's qLDPC breakthrough, recent studies project quantum computers cracking RSA-2048 and ECDLP-256 by 2029. Google and cybersecurity experts warn of imminent Q-Day, pushing post-quantum cryptography to avert a crisis worse than Y2K, with businesses ramping up quantum-safe migrations.

A security vulnerability in Dell software has reportedly remained unpatched for almost two years, allowing Chinese hackers to exploit it. The flaw involves hardcoded login credentials in a tool, raising concerns about data security.

Reported by AI

Mozilla's Firefox browser will cease support for Windows 7, 8, and 8.1 after February 2026. Users on these systems must upgrade to Windows 10 or later to continue receiving security updates. As an alternative, Mozilla suggests switching to a Linux-based operating system.

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline