Microsoft Open Management Infrastructure (OMI) < 3.1.135 — PE
Microsoft Open Management Infrastructure (OMI) within Azure VM Management Extensions contains an unspecified vulnerability allowing privilege escalation.
A local attacker, with a low-privilege account, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2021-11-17 under CISA BOD 22-01.
This vulnerability affects Microsoft Open Management Infrastructure (OMI). Open Management Infrastructure Elevation of Privilege Vulnerability Exploitation requires local access, low attack complexity, a low-privilege authenticated account, and no user interaction required.
Probably yes if any of these apply:
Active exploitation documented in the wild. Threat-research write-up: http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html
Manual remediation steps
Apply the Microsoft Security Update
This vulnerability is fixed by Microsoft's official security update.
Affected Products
Installation Methods
Windows Update (recommended)
Microsoft Download Links
Verification
Confirm the update is installed:
Get-HotFix | Sort-Object InstalledOn -Descending | Select-Object -First 10
References
Discovery Credit
<a href="https://twitter.com/shirtamari">Shir Tamari</a> with <a href="https://wiz.io">Wiz.io</a>, <a href="https://twitter.com/nirohfeld">Nir Ohfeld</a> with <a href="https://wiz.io">Wiz.io</a>
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.
References