Описание
Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability
FAQ
What is OMI?
Open Management Infrastructure (OMI) is an open-source Web-Based Enterprise Management (WBEM) implementation for managing Linux and UNIX systems. Azure Virtual Machine (VM) management extensions mentioned in this CVE use this framework to orchestrate configuration management and log collection on Linux VMs.
Refer to this link for more details: GitHub - microsoft/omi: Open Management Infrastructure.
What versions of OMI are vulnerable?
OMI versions v1.6.9-0 and below are vulnerable.
How can an attacker exploit the vulnerability?
In OMI, internal process communication is authenticated by using a key that consists of a random number. The method used to generate the random number can be spoofed by an attacker to manipulate the OMI communications to gain elevated privileges. The attacker must be locally logged in to the machine on which the OMI components are running.
How do the updates address the vulnerability?
The randomly generated string-based authentication mechanism has been replaced with a mechanism that ensures appropriate access control on the local socket that is used for communication between the OMI components.
How can I determine which VMs are impacted by this vulnerability?
Azure VMs that use the VM Management Extensions listed in the following table are impacted. All customers that are impacted will be notified directly.
To identify the affected VMs in their Azure subscriptions, customers can use one of the following methods:
Use Microsoft Defender for Cloud to find machines affected by this vulnerability.
To identify an Azure VM for the vulnerable extensions, leverage Azure Portal or Azure CLI as described in this article. If the reported extension versions match the versions listed for the ‘Fixed Extension Versions’ in the following table, no further action is required. If they do not match, then please follow the instructions given in the table.
To scan an Azure subscription for vulnerable VMs use the script here. This script can also be used to patch the affected VMs using the upgradeOMI parameter.
- Note that the script identifies machines based on the vulnerable OMI version. The OMI can be installed as a standalone package or get installed along with the specified VM extensions. The script would determine a VM as affected in both cases.
- The VM should not be deallocated for the script to determine if it is affected.
- The ‘upgradeOMI’ parameter will upgrade the OMI package on the machine with no downtime and does not require a VM reboot.
- The script upgrades the OMI version only. The VM extensions for other products are not updated. The extensions need to be updated separately by following the instructions given in the following table.
What products are affected by this vulnerability and how can I protect myself?
The following table lists the affected services and the required customer action to protect against this vulnerability.
| Affected Product | Fixed Version Number | Customer action required |
|---|---|---|
| OMI as standalone package | OMI version v1.6.9-1 | Manually download the update here |
| Azure Automation Desired State Configuration, DSC Extension | Linux DSC Agent versions: | Manually update the VM extension using the instructions here |
| 2.71.1.33 (for Version 2) | ||
| 3.0.0.7 (for Version 3) | ||
| System Center Operations Manager (SCOM) Management Pack for UNIX and Linux Operating Systems | Management Pack for SCOM 2016: 7.6.1108.0 | Manually download and update the applicable management packs: 2016, 2019, or 2022. |
| Management Pack for SCOM 2019: 10.19.1152.0 | ||
| Management Pack for SCOM 2022: 10.22.1024.0 | ||
| Log Analytics Agent | OMS Agent for Linux GA v1.14.13 | Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here. |
| Azure Security Center | OMS Agent for Linux GA v1.14.13 | Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here. |
| Container Monitoring Solution | Image tag: microsoft-oms-latest with full ID: sha256:6131e66cdf7bd07f9db3bbb17902ea8695a2f2bda0cf72ff16170aaf93b56f3b | Manually update the OMS-docker image using instructions here. |
| Azure Sentinel | OMS Agent for Linux GA v1.14.13 | Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here. |
| Azure Stack Hub | Azure Monitor, Update and Configuration Management version 1.14.13 | A new extension version is available via the Azure Stack Hub marketplace. Manually update using instructions here. |
| Azure HDInsight | HDInsight Version 4.0, 3.6; omsagent-1.14.13.0 and omi-1.6.9-1 | Customers must apply the updates by running this script on every cluster node or as communicated separately to you. |
| Azure Automation | OMS Agent for Linux GA v1.14.13 | Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here. |
| Azure Automation Update Management | OMS Agent for Linux GA v1.14.13 | Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here. |
| Azure Diagnostics (LAD) | LAD v3: 3.0.137 and LAD v4: 4.0.27 | Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here. |
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Open Management Infrastructure | ||
| Azure Automation State Configuration, DSC Extension | - | |
| Azure Automation Update Management | - | |
| Log Analytics Agent | - | |
| Azure Diagnostics (LAD) | - | |
| Container Monitoring Solution | ||
| Azure Security Center | - | |
| Azure Sentinel | - | |
| Azure Stack Hub | - | |
| System Center Operations Manager (SCOM) 2016 |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
7.8 High
CVSS3
Связанные уязвимости
Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability
Уязвимость сервера управления предприятием через Интернет Open Management Infrastructure (OMI) расширений для управления виртуальными машинами Azure, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии
EPSS
7.8 High
CVSS3