Security Updates for Microsoft System Center Operations Manager (October 2021)

high Nessus Plugin ID 154173


A web application hosted on the remote Windows system is affected by an information disclosure vulnerability.


The version of Microsoft System Center Operations Manager installed on the remote Windows host is affected by an information disclosure vulnerability. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to an affected SCOM instance in order to reveal file content.


Microsoft has released a set of patches for System Center Operations Manager 2012 R2, 2016, and 2019.

See Also

Plugin Details

Severity: High

ID: 154173

File Name: smb_nt_ms21_oct_system_center_operations_manager.nasl

Version: 1.4

Type: local

Agent: windows

Published: 10/15/2021

Updated: 11/28/2023

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-41352


Risk Factor: High

Base Score: 7.5

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:system_center_operations_manager

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/12/2021

Vulnerability Publication Date: 10/12/2021

Reference Information

CVE: CVE-2021-41352

IAVA: 2021-A-0470-S

MSFT: MS21-5006871

MSKB: 5006871