Microsoft Open Management Infrastructure (OMI) < 3.1.135 — RCE
Microsoft Open Management Infrastructure (OMI) within Azure VM Management Extensions contains an unspecified vulnerability allowing remote code execution.
A remote attacker, without authentication, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. CISA has confirmed use of this vulnerability in known ransomware campaigns — treat as high priority for remediation. Federal agencies are required to remediate by 2021-11-17 under CISA BOD 22-01.
This vulnerability affects Microsoft Open Management Infrastructure (OMI). Open Management Infrastructure Remote Code Execution Vulnerability Exploitation requires remote network access, low attack complexity, no authentication required, and no user interaction required.
📧
Phishing link
🖼
Malicious file
🔓
Server compromised
Probably yes if any of these apply:
Used in known ransomware campaigns. Threat-research write-up: http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html
Manual remediation steps
Apply the Microsoft Security Update
This vulnerability is fixed by Microsoft's official security update.
Affected Products
Installation Methods
Windows Update (recommended)
Microsoft Download Links
Verification
Confirm the update is installed:
Get-HotFix | Sort-Object InstalledOn -Descending | Select-Object -First 10
References
Discovery Credit
<a href="https://twitter.com/shirtamari">Shir Tamari</a> with <a href="https://wiz.io">Wiz.io</a>, <a href="https://twitter.com/nirohfeld">Nir Ohfeld</a> with <a href="https://wiz.io">Wiz.io</a>
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.
References