Security Updates for Microsoft System Center Operations Manager (October 2021)

high Nessus Plugin ID 154173
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


A web application hosted on the remote Windows system is affected by an information disclosure vulnerability.


The version of Microsoft System Center Operations Manager installed on the remote Windows host is affected by an information disclosure vulnerability. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to an affected SCOM instance in order to reveal file content.


Microsoft has released a set of patches for System Center Operations Manager 2012 R2, 2016, and 2019.

See Also

Plugin Details

Severity: High

ID: 154173

File Name: smb_nt_ms21_oct_system_center_operations_manager.nasl

Version: 1.2

Type: local

Agent: windows

Published: 10/15/2021

Updated: 10/19/2021

Dependencies: system_center_operations_mgr_installed.nasl

Risk Information

CVSS Score Source: CVE-2021-41352


Risk Factor: Medium

Score: 4.4


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:system_center_operations_manager

Exploit Ease: No known exploits are available

Patch Publication Date: 10/12/2021

Vulnerability Publication Date: 10/12/2021

Reference Information

CVE: CVE-2021-41352

MSKB: 5006871

MSFT: MS21-5006871

IAVA: 2021-A-0470