Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-29149

Опубликовано: 14 июн. 2022
Источник: msrc
CVSS3: 7.8
EPSS Низкий

Описание

Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability

FAQ

What is OMI?

Open Management Infrastructure (OMI) is an open-source Web-Based Enterprise Management (WBEM) implementation for managing Linux and UNIX systems. Azure Virtual Machine (VM) management extensions mentioned in this CVE use this framework to orchestrate configuration management and log collection on Linux VMs.

Refer to this link for more details: GitHub - microsoft/omi: Open Management Infrastructure.

What versions of OMI are vulnerable?

OMI versions v1.6.9-0 and below are vulnerable.

How can an attacker exploit the vulnerability?

In OMI, internal process communication is authenticated by using a key that consists of a random number. The method used to generate the random number can be spoofed by an attacker to manipulate the OMI communications to gain elevated privileges. The attacker must be locally logged in to the machine on which the OMI components are running.

How do the updates address the vulnerability?

The randomly generated string-based authentication mechanism has been replaced with a mechanism that ensures appropriate access control on the local socket that is used for communication between the OMI components.

How can I determine which VMs are impacted by this vulnerability?

Azure VMs that use the VM Management Extensions listed in the following table are impacted. All customers that are impacted will be notified directly.

To identify the affected VMs in their Azure subscriptions, customers can use one of the following methods:

  • Use Microsoft Defender for Cloud to find machines affected by this vulnerability.

  • To identify an Azure VM for the vulnerable extensions, leverage Azure Portal or Azure CLI as described in this article. If the reported extension versions match the versions listed for the ‘Fixed Extension Versions’ in the following table, no further action is required. If they do not match, then please follow the instructions given in the table.

  • To scan an Azure subscription for vulnerable VMs use the script here. This script can also be used to patch the affected VMs using the upgradeOMI parameter.

    • Note that the script identifies machines based on the vulnerable OMI version. The OMI can be installed as a standalone package or get installed along with the specified VM extensions. The script would determine a VM as affected in both cases.
    • The VM should not be deallocated for the script to determine if it is affected.
    • The ‘upgradeOMI’ parameter will upgrade the OMI package on the machine with no downtime and does not require a VM reboot.
    • The script upgrades the OMI version only. The VM extensions for other products are not updated. The extensions need to be updated separately by following the instructions given in the following table.

What products are affected by this vulnerability and how can I protect myself?

The following table lists the affected services and the required customer action to protect against this vulnerability.

Affected ProductFixed Version NumberCustomer action required
OMI as standalone packageOMI version v1.6.9-1Manually download the update here
Azure Automation Desired State Configuration, DSC ExtensionLinux DSC Agent versions:Manually update the VM extension using the instructions here
2.71.1.33 (for Version 2)
3.0.0.7 (for Version 3)
System Center Operations Manager (SCOM) Management Pack for UNIX and Linux Operating SystemsManagement Pack for SCOM 2016: 7.6.1108.0Manually download and update the applicable management packs: 2016, 2019, or 2022.
Management Pack for SCOM 2019: 10.19.1152.0
Management Pack for SCOM 2022: 10.22.1024.0
Log Analytics AgentOMS Agent for Linux GA v1.14.13Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.
Azure Security CenterOMS Agent for Linux GA v1.14.13Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.
Container Monitoring SolutionImage tag: microsoft-oms-latest with full ID: sha256:6131e66cdf7bd07f9db3bbb17902ea8695a2f2bda0cf72ff16170aaf93b56f3bManually update the OMS-docker image using instructions here.
Azure SentinelOMS Agent for Linux GA v1.14.13Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.
Azure Stack HubAzure Monitor, Update and Configuration Management version 1.14.13A new extension version is available via the Azure Stack Hub marketplace. Manually update using instructions here.
Azure HDInsightHDInsight Version 4.0, 3.6; omsagent-1.14.13.0 and omi-1.6.9-1Customers must apply the updates by running this script on every cluster node or as communicated separately to you.
Azure AutomationOMS Agent for Linux GA v1.14.13Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.
Azure Automation Update ManagementOMS Agent for Linux GA v1.14.13Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.
Azure Diagnostics (LAD)LAD v3: 3.0.137 and LAD v4: 4.0.27Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.

Обновления

ПродуктСтатьяОбновление
Open Management Infrastructure
Azure Automation State Configuration, DSC Extension
-
Azure Automation Update Management
-
Log Analytics Agent
-
Azure Diagnostics (LAD)
-
Container Monitoring Solution
Azure Security Center
-
Azure Sentinel
-
Azure Stack Hub
-
System Center Operations Manager (SCOM) 2016

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 44%
0.00217
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 3 лет назад

Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability

CVSS3: 7.8
fstec
почти 4 года назад

Уязвимость сервера управления предприятием через Интернет Open Management Infrastructure (OMI) расширений для управления виртуальными машинами Azure, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 44%
0.00217
Низкий

7.8 High

CVSS3