Security Updates for Microsoft System Center Operations Manager (February 2021)

high Nessus Plugin ID 146479

Synopsis

A web application hosted on the remote Windows system is affected by an elevation of privilege vulnerability.

Description

The version of Microsoft System Center Operations Manager installed on the remote Windows host is affected by an elevation of privilege vulnerability. A remote, authenticated attacker can exploit this vulnerability by sending a specially crafted request to an affected SCOM instance.

Solution

Microsoft has released a set of patches for System Center Operations Manager 2019.

See Also

http://www.nessus.org/u?86b40c69

http://www.nessus.org/u?6d57fb2a

Plugin Details

Severity: High

ID: 146479

File Name: smb_nt_ms21_feb_system_center_operations_manager.nasl

Version: 1.2

Type: local

Agent: windows

Published: 2/12/2021

Updated: 2/17/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2021-1728

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:system_center_operations_manager

Required KB Items: installed_sw/System Center Operations Manager Server

Exploit Ease: No known exploits are available

Patch Publication Date: 2/9/2021

Vulnerability Publication Date: 2/9/2021

Reference Information

CVE: CVE-2021-1728

IAVA: 2021-A-0089

MSFT: MS21-4601269

MSKB: 4601269