Security Updates for Microsoft System Center Operations Manager (October 2021)

high Nessus Plugin ID 154173

Synopsis

A web application hosted on the remote Windows system is affected by an information disclosure vulnerability.

Description

The version of Microsoft System Center Operations Manager installed on the remote Windows host is affected by an information disclosure vulnerability. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to an affected SCOM instance in order to reveal file content.

Solution

Microsoft has released a set of patches for System Center Operations Manager 2012 R2, 2016, and 2019.

See Also

http://www.nessus.org/u?ce956d40

http://www.nessus.org/u?352f3785

Plugin Details

Severity: High

ID: 154173

File Name: smb_nt_ms21_oct_system_center_operations_manager.nasl

Version: 1.4

Type: local

Agent: windows

Published: 10/15/2021

Updated: 11/28/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-41352

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:system_center_operations_manager

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/12/2021

Vulnerability Publication Date: 10/12/2021

Reference Information

CVE: CVE-2021-41352

IAVA: 2021-A-0470-S

MSFT: MS21-5006871

MSKB: 5006871