Security Updates for Microsoft System Center Operations Manager (December 2024)

high Nessus Plugin ID 213008

Synopsis

A web application hosted on the remote Windows system is affected by an elevation of privilege vulnerability.

Description

The version of Microsoft System Center Operations Manager installed on the remote Windows host is affected by an elevation of privilege vulnerability. A remote, authenticated attacker can exploit this vulnerability by sending a specially crafted request to an affected SCOM instance.

Solution

Microsoft has released a set of patches for System Center Operations Manager 2019, 2022, and 2025.

See Also

http://www.nessus.org/u?

http://www.nessus.org/u?1e98891e

http://www.nessus.org/u?1b53efd0

Plugin Details

Severity: High

ID: 213008

File Name: smb_nt_ms24_dec_scom.nasl

Version: 1.1

Type: local

Agent: windows

Published: 12/13/2024

Updated: 12/13/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Medium

Base Score: 6.6

Vector: CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-43594

CVSS v3

Risk Factor: High

Base Score: 7.3

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:microsoft:system_center_operations_manager

Required KB Items: installed_sw/System Center Operations Manager Server

Patch Publication Date: 12/10/2024

Vulnerability Publication Date: 12/10/2024

Reference Information

CVE: CVE-2024-43594

IAVA: 2024-A-0810