Security Updates for Microsoft System Center Operations Manager (June 2020)

medium Nessus Plugin ID 137369

Synopsis

A web application hosted on the remote Windows system is affected by a spoofing vulnerability.

Description

The version of Microsoft System Center Operations Manager installed on the remote Windows host is affected by a spoofing vulnerability. An attacker can exploit this vulnerability by sending a specially crafted request to an affected SCOM instance.

Solution

Microsoft has released a set of patches for System Center Operations Manager 2016.

See Also

http://www.nessus.org/u?593b93f8

Plugin Details

Severity: Medium

ID: 137369

File Name: smb_nt_ms20_jun_scom.nasl

Version: 1.8

Type: local

Agent: windows

Published: 6/12/2020

Updated: 10/15/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 2.6

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS Score Source: CVE-2020-1331

CVSS v3

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:system_center_operations_manager

Required KB Items: SMB/MS_Bulletin_Checks/Possible, installed_sw/System Center Operations Manager 2016 Server

Exploit Ease: No known exploits are available

Patch Publication Date: 6/9/2020

Vulnerability Publication Date: 6/9/2020

Reference Information

CVE: CVE-2020-1331

IAVA: 2020-A-0258

MSFT: MS20-06

MSKB: 4566040