Vulnerabilites related to microsoft - log_analytics_agent
Vulnerability from fkie_nvd
Published
2021-09-15 12:15
Modified
2024-11-21 06:17
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Open Management Infrastructure Elevation of Privilege Vulnerability
References
Impacted products
{ "cisaActionDue": "2021-11-17", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Microsoft Open Management Infrastructure (OMI) Privilege Escalation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEC617A6-F1BC-44DE-A9BB-BECF2E788B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A8B342-E863-4C71-9CE1-FB325FF34829", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_diagnostics_\\(lad\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "37AC51D6-F6F3-45D8-91E7-6EDD01C0273E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_open_management_infrastructure:-:*:*:*:*:*:*:*", "matchCriteriaId": "8477F336-71BB-4C49-A4EB-E1BC1EFF2F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_security_center:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1626DA-5B19-4291-B840-633EF458984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_sentinel:-:*:*:*:*:*:*:*", "matchCriteriaId": "B80F8C3B-BEF9-43D5-9455-6C6F608CF519", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_stack_hub:-:*:*:*:*:*:*:*", "matchCriteriaId": "B457DA44-AD83-4E5C-B180-8A227462EC60", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A461E8-C834-4F97-98E3-516A191A3BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDAE892B-324C-45E3-BFA0-C2B7B6939F54", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "79983385-D5FE-4F76-924C-A2AA7E5BAAE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open Management Infrastructure Elevation of Privilege Vulnerability" }, { "lang": "es", "value": "Una Vulnerabilidad de Elevaci\u00f3n de Privilegios en Open Management Infrastructure. Este CVE ID es diferente de CVE-2021-38648, CVE-2021-38649" } ], "id": "CVE-2021-38645", "lastModified": "2024-11-21T06:17:48.213", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "secure@microsoft.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2021-09-15T12:15:14.967", "references": [ { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38645" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-15 12:15
Modified
2024-11-21 06:17
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Open Management Infrastructure Elevation of Privilege Vulnerability
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html | Exploit, Third Party Advisory, VDB Entry | |
secure@microsoft.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38648 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38648 | Patch, Vendor Advisory |
Impacted products
{ "cisaActionDue": "2021-11-17", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Microsoft Open Management Infrastructure (OMI) Privilege Escalation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEC617A6-F1BC-44DE-A9BB-BECF2E788B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A8B342-E863-4C71-9CE1-FB325FF34829", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_diagnostics_\\(lad\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "37AC51D6-F6F3-45D8-91E7-6EDD01C0273E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_open_management_infrastructure:-:*:*:*:*:*:*:*", "matchCriteriaId": "8477F336-71BB-4C49-A4EB-E1BC1EFF2F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_security_center:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1626DA-5B19-4291-B840-633EF458984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_sentinel:-:*:*:*:*:*:*:*", "matchCriteriaId": "B80F8C3B-BEF9-43D5-9455-6C6F608CF519", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_stack_hub:-:*:*:*:*:*:*:*", "matchCriteriaId": "B457DA44-AD83-4E5C-B180-8A227462EC60", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A461E8-C834-4F97-98E3-516A191A3BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDAE892B-324C-45E3-BFA0-C2B7B6939F54", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "79983385-D5FE-4F76-924C-A2AA7E5BAAE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open Management Infrastructure Elevation of Privilege Vulnerability" }, { "lang": "es", "value": "Una Vulnerabilidad de Elevaci\u00f3n de Privilegios en Open Management Infrastructure. Este ID CVE es \u00fanico desde CVE-2021-38645, CVE-2021-38649" } ], "id": "CVE-2021-38648", "lastModified": "2024-11-21T06:17:48.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "secure@microsoft.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2021-09-15T12:15:15.147", "references": [ { "source": "secure@microsoft.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38648" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-15 12:15
Modified
2024-11-21 06:17
Severity ?
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Open Management Infrastructure Elevation of Privilege Vulnerability
References
Impacted products
{ "cisaActionDue": "2021-11-17", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Microsoft Open Management Infrastructure (OMI) Privilege Escalation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEC617A6-F1BC-44DE-A9BB-BECF2E788B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A8B342-E863-4C71-9CE1-FB325FF34829", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_diagnostics_\\(lad\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "37AC51D6-F6F3-45D8-91E7-6EDD01C0273E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_open_management_infrastructure:-:*:*:*:*:*:*:*", "matchCriteriaId": "8477F336-71BB-4C49-A4EB-E1BC1EFF2F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_security_center:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1626DA-5B19-4291-B840-633EF458984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_sentinel:-:*:*:*:*:*:*:*", "matchCriteriaId": "B80F8C3B-BEF9-43D5-9455-6C6F608CF519", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_stack_hub:-:*:*:*:*:*:*:*", "matchCriteriaId": "B457DA44-AD83-4E5C-B180-8A227462EC60", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A461E8-C834-4F97-98E3-516A191A3BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDAE892B-324C-45E3-BFA0-C2B7B6939F54", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "79983385-D5FE-4F76-924C-A2AA7E5BAAE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open Management Infrastructure Elevation of Privilege Vulnerability" }, { "lang": "es", "value": "Una Vulnerabilidad de Elevaci\u00f3n de Privilegios en Open Management Infrastructure. Este CVE ID es diferente de CVE-2021-38645, CVE-2021-38648" } ], "id": "CVE-2021-38649", "lastModified": "2024-11-21T06:17:48.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "secure@microsoft.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2021-09-15T12:15:15.203", "references": [ { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-15 22:15
Modified
2025-01-02 19:16
Severity ?
Summary
Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEC617A6-F1BC-44DE-A9BB-BECF2E788B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A8B342-E863-4C71-9CE1-FB325FF34829", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_diagnostics:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FDF9306-CC67-4A45-8FB1-AA18946FCD8D", "versionEndExcluding": "3.0.137", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_diagnostics:*:*:*:*:*:*:*:*", "matchCriteriaId": "5228AB79-AFF1-4B2D-BB60-62D180F6D83B", "versionEndExcluding": "4.0.27", "versionStartIncluding": "4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_security_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0561E514-5A02-4850-8D52-65A8B4B642B2", "versionEndExcluding": "1.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_sentinel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC02B82A-903B-467E-92D7-21573ED88FF8", "versionEndExcluding": "1.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*", "matchCriteriaId": "51886A45-029F-40A8-929B-49552FEB5298", "versionEndExcluding": "1.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A461E8-C834-4F97-98E3-516A191A3BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDAE892B-324C-45E3-BFA0-C2B7B6939F54", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "73FDDB2A-BA93-47AB-82A3-314638D8A660", "versionEndExcluding": "1.6.9-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:2016:-:*:*:*:*:*:*", "matchCriteriaId": "480C08E8-C868-455C-97FB-68311B523F8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:2019:-:*:*:*:*:*:*", "matchCriteriaId": "0BFD64D6-E8BB-4606-8D4C-EAE586CAD791", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:2022:-:*:*:*:*:*:*", "matchCriteriaId": "ABD632BE-513E-4581-9C8C-3A13DA1ADF1F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability" }, { "lang": "es", "value": "Una Vulnerabilidad de Elevaci\u00f3n de Privilegios en Azure Open Management Infrastructure (OMI)" } ], "id": "CVE-2022-29149", "lastModified": "2025-01-02T19:16:13.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "secure@microsoft.com", "type": "Secondary" } ] }, "published": "2022-06-15T22:15:13.220", "references": [ { "source": "secure@microsoft.com", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29149" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-15 12:15
Modified
2024-11-21 06:17
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Open Management Infrastructure Remote Code Execution Vulnerability
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html | Exploit, Third Party Advisory, VDB Entry | |
secure@microsoft.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38647 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38647 | Patch, Vendor Advisory |
Impacted products
{ "cisaActionDue": "2021-11-17", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Microsoft Open Management Infrastructure (OMI) Remote Code Execution Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEC617A6-F1BC-44DE-A9BB-BECF2E788B0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A8B342-E863-4C71-9CE1-FB325FF34829", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_diagnostics_\\(lad\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "37AC51D6-F6F3-45D8-91E7-6EDD01C0273E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_open_management_infrastructure:-:*:*:*:*:*:*:*", "matchCriteriaId": "8477F336-71BB-4C49-A4EB-E1BC1EFF2F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_security_center:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1626DA-5B19-4291-B840-633EF458984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_sentinel:-:*:*:*:*:*:*:*", "matchCriteriaId": "B80F8C3B-BEF9-43D5-9455-6C6F608CF519", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_stack_hub:-:*:*:*:*:*:*:*", "matchCriteriaId": "B457DA44-AD83-4E5C-B180-8A227462EC60", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A461E8-C834-4F97-98E3-516A191A3BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDAE892B-324C-45E3-BFA0-C2B7B6939F54", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "79983385-D5FE-4F76-924C-A2AA7E5BAAE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open Management Infrastructure Remote Code Execution Vulnerability" }, { "lang": "es", "value": "Una Vulnerabilidad de Ejecuci\u00f3n de C\u00f3digo Remota de Open Management Infrastructure" } ], "id": "CVE-2021-38647", "lastModified": "2024-11-21T06:17:48.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "secure@microsoft.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2021-09-15T12:15:15.090", "references": [ { "source": "secure@microsoft.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38647" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-12 17:15
Modified
2024-12-27 17:07
Severity ?
Summary
Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:azure_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "D341E199-250C-47C7-ABE8-39973A5C63E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "23A8B342-E863-4C71-9CE1-FB325FF34829", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_security_center:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1626DA-5B19-4291-B840-633EF458984C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_sentinel:-:*:*:*:*:*:*:*", "matchCriteriaId": "B80F8C3B-BEF9-43D5-9455-6C6F608CF519", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A461E8-C834-4F97-98E3-516A191A3BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDAE892B-324C-45E3-BFA0-C2B7B6939F54", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:operations_management_suite_agent_for_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1B6D6F4-F48C-482B-B54B-6962D6D506A9", "versionEndExcluding": "1.8.1-0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:2019:-:*:*:*:*:*:*", "matchCriteriaId": "0BFD64D6-E8BB-4606-8D4C-EAE586CAD791", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:2022:-:*:*:*:*:*:*", "matchCriteriaId": "ABD632BE-513E-4581-9C8C-3A13DA1ADF1F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability" }, { "lang": "es", "value": "Infraestructura de gesti\u00f3n abierta (OMI) Vulnerabilidad de elevaci\u00f3n de privilegios" } ], "id": "CVE-2024-21330", "lastModified": "2024-12-27T17:07:41.530", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "secure@microsoft.com", "type": "Primary" } ] }, "published": "2024-03-12T17:15:49.143", "references": [ { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21330" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "secure@microsoft.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2021-38649
Vulnerability from cvelistv5
Published
2021-09-15 11:24
Modified
2025-02-04 18:10
Severity ?
EPSS score ?
Summary
Open Management Infrastructure Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Open Management Infrastructure |
Version: 16.0 < OMI Version 1.6.8-1 cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:* |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:51:19.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-38649", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T18:09:12.228704Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-38649" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T18:10:06.764Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Open Management Infrastructure", "vendor": "Microsoft", "versions": [ { "lessThan": "OMI Version 1.6.8-1", "status": "affected", "version": "16.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "System Center Operations Manager (SCOM)", "vendor": "Microsoft", "versions": [ { "lessThan": "OMI version: 1.6.8-1", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Automation State Configuration, DSC Extension", "vendor": "Microsoft", "versions": [ { "lessThan": "DSC Agent versions: 2.71.1.25, 2.70.0.30, 3.0.0.3", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Automation Update Management", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Log Analytics Agent", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_diagnostics:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Diagnostics (LAD)", "vendor": "Microsoft", "versions": [ { "lessThan": "LAD v4.0.13 and LAD v3.0.135", "status": "affected", "version": "3.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Container Monitoring Solution", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_security_center:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Security Center", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_sentinel:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Sentinel", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Stack Hub", "vendor": "Microsoft", "versions": [ { "lessThan": "Monitor, Update and Config Mgmnt 1.14.01", "status": "affected", "version": "1.0.0", "versionType": "custom" }, { "lessThan": "3.1.135", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] } ], "datePublic": "2021-09-14T07:00:00.000Z", "descriptions": [ { "lang": "en-US", "value": "Open Management Infrastructure Elevation of Privilege Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-28T19:37:21.066Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649" } ], "title": "Open Management Infrastructure Elevation of Privilege Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2021-38649", "datePublished": "2021-09-15T11:24:09.000Z", "dateReserved": "2021-08-13T00:00:00.000Z", "dateUpdated": "2025-02-04T18:10:06.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-21330
Vulnerability from cvelistv5
Published
2024-03-12 16:57
Modified
2024-12-31 20:19
Severity ?
EPSS score ?
Summary
Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21330 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | System Center Operations Manager (SCOM) 2019 |
Version: 10.19.0 < 10.19.1253.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21330", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-12T19:23:30.888206Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:37:56.602Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:20:40.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21330" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Unknown" ], "product": "System Center Operations Manager (SCOM) 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "10.19.1253.0", "status": "affected", "version": "10.19.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "System Center Operations Manager (SCOM) 2022", "vendor": "Microsoft", "versions": [ { "lessThan": "10.22.1070.0", "status": "affected", "version": "10.22.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Azure Automation", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA 1.19.0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Azure Automation Update Management", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.19.0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Azure Sentinel", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.19.0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Container Monitoring Solution", "vendor": "Microsoft", "versions": [ { "lessThan": "microsoft-oms-latest with full ID: sha256:855bfeb0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Azure HDInsight", "vendor": "Microsoft", "versions": [ { "lessThan": "omi-1.8.1-0", "status": "affected", "version": "1.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Open Management Infrastructure", "vendor": "Microsoft", "versions": [ { "lessThan": "OMI version 1.8.1-0", "status": "affected", "version": "16.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Open Management Infrastructure", "vendor": "Microsoft", "versions": [ { "lessThan": "1.8.1-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Azure Security Center", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA 1.19.0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Log Analytics Agent", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.19.0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:*:-:*:*:*:*:*:*", "versionEndExcluding": "10.19.1253.0", "versionStartIncluding": "10.19.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:*:-:*:*:*:*:*:*", "versionEndExcluding": "10.22.1070.0", "versionStartIncluding": "10.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_automation:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMS Agent for Linux GA 1.19.0", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_automation_update_management:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMS Agent for Linux GA v1.19.0", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_sentinel:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMS Agent for Linux GA v1.19.0", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:container_monitoring_solution:*:*:*:*:*:*:*:*", "versionEndExcluding": "microsoft-oms-latest with full ID: sha256:855bfeb0", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_hdinsights:*:*:*:*:*:*:*:*", "versionEndExcluding": "omi-1.8.1-0", "versionStartIncluding": "1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMI version 1.8.1-0", "versionStartIncluding": "16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:open_management_suite_agent_for_linux:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.8.1-0", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_security_center:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMS Agent for Linux GA 1.19.0", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:log_analytics_agent:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMS Agent for Linux GA v1.19.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "datePublic": "2024-03-12T07:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-31T20:19:26.885Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21330" } ], "title": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2024-21330", "datePublished": "2024-03-12T16:57:56.930Z", "dateReserved": "2023-12-08T22:45:19.370Z", "dateUpdated": "2024-12-31T20:19:26.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-38647
Vulnerability from cvelistv5
Published
2021-09-15 11:24
Modified
2025-02-04 14:45
Severity ?
EPSS score ?
Summary
Open Management Infrastructure Remote Code Execution Vulnerability
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Open Management Infrastructure |
Version: 16.0 < OMI Version 1.6.8-1 cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:* |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:51:18.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38647" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-38647", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T14:45:47.017000Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-38647" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T14:45:50.109Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Open Management Infrastructure", "vendor": "Microsoft", "versions": [ { "lessThan": "OMI Version 1.6.8-1", "status": "affected", "version": "16.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "System Center Operations Manager (SCOM)", "vendor": "Microsoft", "versions": [ { "lessThan": "OMI version: 1.6.8-1", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Automation State Configuration, DSC Extension", "vendor": "Microsoft", "versions": [ { "lessThan": "DSC Agent versions: 2.71.1.25, 2.70.0.30, 3.0.0.3", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Automation Update Management", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Log Analytics Agent", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_diagnostics:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Diagnostics (LAD)", "vendor": "Microsoft", "versions": [ { "lessThan": "LAD v4.0.13 and LAD v3.0.135", "status": "affected", "version": "3.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Container Monitoring Solution", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_security_center:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Security Center", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_sentinel:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Sentinel", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Stack Hub", "vendor": "Microsoft", "versions": [ { "lessThan": "Monitor, Update and Config Mgmnt 1.14.01", "status": "affected", "version": "1.0.0", "versionType": "custom" }, { "lessThan": "3.1.135", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] } ], "datePublic": "2021-09-14T07:00:00.000Z", "descriptions": [ { "lang": "en-US", "value": "Open Management Infrastructure Remote Code Execution Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-28T19:37:20.007Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38647" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html" } ], "title": "Open Management Infrastructure Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2021-38647", "datePublished": "2021-09-15T11:24:07.000Z", "dateReserved": "2021-08-13T00:00:00.000Z", "dateUpdated": "2025-02-04T14:45:50.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-38645
Vulnerability from cvelistv5
Published
2021-09-15 11:24
Modified
2025-02-04 15:44
Severity ?
EPSS score ?
Summary
Open Management Infrastructure Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38645 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Open Management Infrastructure |
Version: 16.0 < OMI Version 1.6.8-1 cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:* |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:51:18.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38645" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-38645", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T15:43:58.641391Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-38645" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T15:44:14.662Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Open Management Infrastructure", "vendor": "Microsoft", "versions": [ { "lessThan": "OMI Version 1.6.8-1", "status": "affected", "version": "16.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "System Center Operations Manager (SCOM)", "vendor": "Microsoft", "versions": [ { "lessThan": "OMI version: 1.6.8-1", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Automation State Configuration, DSC Extension", "vendor": "Microsoft", "versions": [ { "lessThan": "DSC Agent versions: 2.71.1.25, 2.70.0.30, 3.0.0.3", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Automation Update Management", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Log Analytics Agent", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_diagnostics:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Diagnostics (LAD)", "vendor": "Microsoft", "versions": [ { "lessThan": "LAD v4.0.13 and LAD v3.0.135", "status": "affected", "version": "3.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Container Monitoring Solution", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_security_center:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Security Center", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_sentinel:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Sentinel", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Stack Hub", "vendor": "Microsoft", "versions": [ { "lessThan": "Monitor, Update and Config Mgmnt 1.14.01", "status": "affected", "version": "1.0.0", "versionType": "custom" }, { "lessThan": "3.1.135", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] } ], "datePublic": "2021-09-14T07:00:00.000Z", "descriptions": [ { "lang": "en-US", "value": "Open Management Infrastructure Elevation of Privilege Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-28T19:37:19.506Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38645" } ], "title": "Open Management Infrastructure Elevation of Privilege Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2021-38645", "datePublished": "2021-09-15T11:24:05.000Z", "dateReserved": "2021-08-13T00:00:00.000Z", "dateUpdated": "2025-02-04T15:44:14.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-38648
Vulnerability from cvelistv5
Published
2021-09-15 11:24
Modified
2025-02-04 18:14
Severity ?
EPSS score ?
Summary
Open Management Infrastructure Elevation of Privilege Vulnerability
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Open Management Infrastructure |
Version: 16.0 < OMI Version 1.6.8-1 cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:* |
||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:51:18.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38648" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-38648", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T18:10:24.645431Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-38648" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T18:14:21.463Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Open Management Infrastructure", "vendor": "Microsoft", "versions": [ { "lessThan": "OMI Version 1.6.8-1", "status": "affected", "version": "16.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "System Center Operations Manager (SCOM)", "vendor": "Microsoft", "versions": [ { "lessThan": "OMI version: 1.6.8-1", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Automation State Configuration, DSC Extension", "vendor": "Microsoft", "versions": [ { "lessThan": "DSC Agent versions: 2.71.1.25, 2.70.0.30, 3.0.0.3", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Automation Update Management", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Log Analytics Agent", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_diagnostics:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Diagnostics (LAD)", "vendor": "Microsoft", "versions": [ { "lessThan": "LAD v4.0.13 and LAD v3.0.135", "status": "affected", "version": "3.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Container Monitoring Solution", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_security_center:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Security Center", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_sentinel:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Sentinel", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.13.40-0", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Azure Stack Hub", "vendor": "Microsoft", "versions": [ { "lessThan": "Monitor, Update and Config Mgmnt 1.14.01", "status": "affected", "version": "1.0.0", "versionType": "custom" }, { "lessThan": "3.1.135", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] } ], "datePublic": "2021-09-14T07:00:00.000Z", "descriptions": [ { "lang": "en-US", "value": "Open Management Infrastructure Elevation of Privilege Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-28T19:37:20.542Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38648" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html" } ], "title": "Open Management Infrastructure Elevation of Privilege Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2021-38648", "datePublished": "2021-09-15T11:24:08.000Z", "dateReserved": "2021-08-13T00:00:00.000Z", "dateUpdated": "2025-02-04T18:14:21.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29149
Vulnerability from cvelistv5
Published
2022-06-15 21:51
Modified
2025-01-02 19:03
Severity ?
EPSS score ?
Summary
Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29149 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Azure Automation State Configuration, DSC Extension |
Version: 2.0.0 < DSC Agent versions: 2.71.1.33, 3.0.0.7 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:59.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Unknown" ], "product": "Azure Automation State Configuration, DSC Extension", "vendor": "Microsoft", "versions": [ { "lessThan": "DSC Agent versions: 2.71.1.33, 3.0.0.7", "status": "affected", "version": "2.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Azure Automation Update Management", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.14.13", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Log Analytics Agent", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.14.13", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Azure Diagnostics (LAD)", "vendor": "Microsoft", "versions": [ { "lessThan": "LAD v4.0.27 and LAD v3.0.137", "status": "affected", "version": "3.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Container Monitoring Solution", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Azure Security Center", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.14.13", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Azure Sentinel", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.14.13", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Azure Stack Hub", "vendor": "Microsoft", "versions": [ { "lessThan": "OMS Agent for Linux GA v1.14.13", "status": "affected", "version": "1.0.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "Open Management Infrastructure", "vendor": "Microsoft", "versions": [ { "lessThan": "OMI Version 1.6.9-1", "status": "affected", "version": "16.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "System Center Operations Manager (SCOM) 2022", "vendor": "Microsoft", "versions": [ { "lessThan": "10.22.1024.0", "status": "affected", "version": "10.22.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "System Center Operations Manager (SCOM) 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "10.19.1152.0", "status": "affected", "version": "10.19.0", "versionType": "custom" } ] }, { "platforms": [ "Unknown" ], "product": "System Center Operations Manager (SCOM) 2016", "vendor": "Microsoft", "versions": [ { "lessThan": "7.6.1108.0", "status": "affected", "version": "7.6.0", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:azure_automation_state_configuration:*:*:*:*:*:*:*:*", "versionEndExcluding": "DSC Agent versions: 2.71.1.33, 3.0.0.7", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_automation_update_management:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMS Agent for Linux GA v1.14.13", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:log_analytics_agent:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMS Agent for Linux GA v1.14.13", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_diagnostics:*:*:*:*:*:*:*:*", "versionEndExcluding": "LAD v4.0.27 and LAD v3.0.137", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:container_monitoring_solution:*:*:*:*:*:*:*:*", "versionEndExcluding": "publication", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_security_center:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMS Agent for Linux GA v1.14.13", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_sentinel:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMS Agent for Linux GA v1.14.13", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMS Agent for Linux GA v1.14.13", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*", "versionEndExcluding": "OMI Version 1.6.9-1", "versionStartIncluding": "16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:*:-:*:*:*:*:*:*", "versionEndExcluding": "10.22.1024.0", "versionStartIncluding": "10.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:*:-:*:*:*:*:*:*", "versionEndExcluding": "10.19.1152.0", "versionStartIncluding": "10.19.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:system_center_operations_manager:*:-:*:*:*:*:*:*", "versionEndExcluding": "7.6.1108.0", "versionStartIncluding": "7.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "datePublic": "2022-06-14T07:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-02T19:03:13.161Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29149" } ], "title": "Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2022-29149", "datePublished": "2022-06-15T21:51:17", "dateReserved": "2022-04-12T00:00:00", "dateUpdated": "2025-01-02T19:03:13.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }